WorldWideScience

Sample records for information operations io

  1. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    National Research Council Canada - National Science Library

    Kucukozyigit, Ali C

    2006-01-01

    ...) and Information Operations (IO) core, supporting and related competencies. Understanding the definitions of information and its value, information superiority, and the decision making cycle provides the foundation for the thesis...

  2. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  3. Information Operations Versus Civilian Marketing and Advertising: A Comparative Analysis to Improve IO Planning and Strategy

    National Research Council Canada - National Science Library

    Chilton, Dan

    2008-01-01

    .... must re-focus its efforts on Information Operations to achieve GWOT objectives. In an environment where rapidly advancing technology is drastically improving the individual's ability to conduct IO against the U.S...

  4. Creating Feedback Channels With Optical Communications For Information Operations (IO)

    Science.gov (United States)

    2016-06-01

    amphibious operations. Optical communications technologies, direct marketing principles , and current IO shortfalls are explored to determine whether...technology. First, these concepts are applied to show covert amphibious operations. Optical communications technologies, direct marketing principles , and...power, as per Appendix A. A major portion of the marketing campaign comes in the form of advertising. The correlating principles of advertising in

  5. Optimization of Cognitive Radio Secondary Information Gathering Station Positioning and Operating Channel Selection for IoT Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jinyi Wen

    2018-01-01

    Full Text Available The Internet of Things (IoT is the interconnection of different objects through the internet using different communication technologies. The objects are equipped with sensors and communications modules. The cognitive radio network is a key technique for the IoT and can effectively address spectrum-related issues for IoT applications. In our paper, a novel method for IoT sensor networks is proposed to obtain the optimal positions of secondary information gathering stations (SIGSs and to select the optimal operating channel. Our objective is to maximize secondary system capacity while protecting the primary system. In addition, we propose an appearance probability matrix for secondary IoT devices (SIDs to maximize the supportable number of SIDs that can be installed in a car, in wearable devices, or for other monitoring devices, based on optimal deployment and probability. We derive fitness functions based on the above objectives and also consider signal to interference-plus-noise ratio (SINR and position constraints. The particle swarm optimization (PSO technique is used to find the best position and operating channel for the SIGSs. In a simulation study, the performance of the proposed method is evaluated and compared with a random resources allocation algorithm (parts of this paper were presented at the ICTC2017 conference (Wen et al., 2017.

  6. Sensitive Information Tracking in Commodity IoT

    OpenAIRE

    Celik, Z. Berkay; Babun, Leonardo; Sikder, Amit K.; Aksu, Hidayet; Tan, Gang; McDaniel, Patrick; Uluagac, A. Selcuk

    2018-01-01

    Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has had profound effects on society--smart homes, personal monitoring devices, enhanced manufacturing and other IoT apps have changed the way we live, play, and work. Yet extant IoT platforms provide few means of evaluating the use (and potential avenues for misuse) of sensitive information. Thus, consumers and organizations have little information to as...

  7. Research of ios operating system security and the abuse of its exploits

    OpenAIRE

    Jucius, Mindaugas

    2017-01-01

    iOS operating system, which is developed by Apple Inc., is claimed to be the most secure product in the market. In the light of worsening human rights conditions, mainly concerning data privacy breaches performed on governmental level, the need to be reassured about the security of software that runs in our pockets is strengthened. This thesis is focused on researching on potential iOS security exploits and their abuse to access private information or perform malicious actions without user’s ...

  8. Preparing the American Soldier in a Brigade Combat Team to Conduct Information Operations in the Contemporary Operational Environment

    National Research Council Canada - National Science Library

    Beckno, Brian T

    2006-01-01

    ...) to conduct Information Operations (IO) in the Contemporary Operational Environment (COE). First, an explanation of IO and its Army applicability is presented using current examples from military operations in Operation Iraqi Freedom (OIF...

  9. Instructor/Operator Station (IOS) Design Guide.

    Science.gov (United States)

    1988-02-01

    INSTRUTOR /OPERATOR STATION (IOS) AI O...The three functional categories also define three different users in terms of jobs and qualifications (if the functions have been allocated to manual ...function manually (e.g., collect the data S required from schedules, printed course outlines and telephone calls to training and facility managers).

  10. Information Operations: Where Next?

    National Research Council Canada - National Science Library

    Buchholz, David R

    2005-01-01

    ... to standardized IO training and integration across the combatant commands. For this reason and others there is a compelling argument for the major responsibility for DoD information operations integration to fall under the control of U.S...

  11. Economics of Internet of Things (IoT): An Information Market Approach

    OpenAIRE

    Niyato, D.; Lu, X.; Wang, P.; Kim, D. I.; Han, Z.

    2015-01-01

    Internet of things (IoT) has been proposed to be a new paradigm of connecting devices and providing services to various applications, e.g., transportation, energy, smart city, and healthcare. In this paper, we focus on an important issue, i.e., economics of IoT, that can have a great impact to the success of IoT applications. In particular, we adopt and present the information economics approach with its applications in IoT. We first review existing economic models developed for IoT services....

  12. iOS app development for dummies

    CERN Document Server

    Feiler, Jesse

    2014-01-01

    If you've got incredible iOS ideas, get this book and bring them to life! iOS 7 represents the most significant update to Apple's mobile operating system since the first iPhone was released, and even the most seasoned app developers are looking for information on how to take advantage of the latest iOS 7 features in their app designs. That's where iOS App Development For Dummies comes in! Whether you're a programming hobbyist wanting to build an app for fun or a professional developer looking to expand into the iOS market, this book will walk you through the fundamentals of building a univer

  13. A Selective Group Authentication Scheme for IoT-Based Medical Information System.

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2017-04-01

    The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.

  14. IoT-Based Smart Garbage System for Efficient Food Waste Management

    Directory of Open Access Journals (Sweden)

    Insung Hong

    2014-01-01

    Full Text Available Owing to a paradigm shift toward Internet of Things (IoT, researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%.

  15. IoT-based smart garbage system for efficient food waste management.

    Science.gov (United States)

    Hong, Insung; Park, Sunghoi; Lee, Beomseok; Lee, Jaekeun; Jeong, Daebeom; Park, Sehyun

    2014-01-01

    Owing to a paradigm shift toward Internet of Things (IoT), researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS) is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs) exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%.

  16. IoT-Based Smart Garbage System for Efficient Food Waste Management

    Science.gov (United States)

    Lee, Jaekeun

    2014-01-01

    Owing to a paradigm shift toward Internet of Things (IoT), researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS) is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs) exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%. PMID:25258730

  17. The Holistic Targeting (HOT) methodology as the means to improve Information Operations (IO) target development and prioritization

    OpenAIRE

    Ieva, Christopher S.

    2008-01-01

    Prioritization. In response to this challenge, this study proposes five recommendations to enhance IO integration into the Joint Targeting Cycle: the use of interim IO Joint Munitions Effectiveness Manual (JMEM) techniques to better forecast cognitive effects, the adoption of the Measure of Worth (MOW) model to assess IO effects, the HOT methodology to develop and prioritize IO targets, the use of compendium software facilitate targeting problem understanding and the network analysis to...

  18. The Use of Information Operations (IO) in Immersive Virtual Environments (IVE)

    Science.gov (United States)

    2010-06-01

    Roll-Playing Game, MMORPG , Cyberspace, Cyber-Warfare. 15. NUMBER OF PAGES 87 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified...4.  Control and Oversight .......................................................................59  5.  IO/ MMORPG Potential...JP Joint Publication MILDEC Military Deception MMORPG Massively Multi-Player Online Role-Playing Game NZSMG Non-Zero Sum Mutual Gaze OPSEC

  19. Perception Management: A Core IO Capability

    National Research Council Canada - National Science Library

    Zaman, Khyber

    2007-01-01

    This thesis postulates that in today's media environment, with adversaries skillfully using propaganda to skirt nations' resolve, Perception Management is key to military success and should be an Information Operations (IO) Core Capability...

  20. Army Information Operations Officer Needs Analysis Report

    Science.gov (United States)

    2016-03-01

    helping with formatting the final report iv ARMY INFORMATION OPERATIONS OFFICER NEEDS ANALYSIS REPORT EXECUTIVE SUMMARY Research...time.” One IO officer suggested the IPO try to get a access the database that has all the old APA reports archived as a way to look at assessment

  1. Using Formal Grammars to Predict I/O Behaviors in HPC: The Omnisc'IO Approach

    Energy Technology Data Exchange (ETDEWEB)

    Dorier, Matthieu; Ibrahim, Shadi; Antoniu, Gabriel; Ross, Rob

    2016-08-01

    The increasing gap between the computation performance of post-petascale machines and the performance of their I/O subsystem has motivated many I/O optimizations including prefetching, caching, and scheduling. In order to further improve these techniques, modeling and predicting spatial and temporal I/O patterns of HPC applications as they run has become crucial. In this paper we present Omnisc'IO, an approach that builds a grammar-based model of the I/O behavior of HPC applications and uses it to predict when future I/O operations will occur, and where and how much data will be accessed. To infer grammars, Omnisc'IO is based on StarSequitur, a novel algorithm extending Nevill-Manning's Sequitur algorithm. Omnisc'IO is transparently integrated into the POSIX and MPI I/O stacks and does not require any modification in applications or higher-level I/O libraries. It works without any prior knowledge of the application and converges to accurate predictions of any N future I/O operations within a couple of iterations. Its implementation is efficient in both computation time and memory footprint.

  2. Panel summary of cyber-physical systems (CPS) and Internet of Things (IoT) opportunities with information fusion

    Science.gov (United States)

    Blasch, Erik; Kadar, Ivan; Grewe, Lynne L.; Brooks, Richard; Yu, Wei; Kwasinski, Andres; Thomopoulos, Stelios; Salerno, John; Qi, Hairong

    2017-05-01

    During the 2016 SPIE DSS conference, nine panelists were invited to highlight the trends and opportunities in cyber-physical systems (CPS) and Internet of Things (IoT) with information fusion. The world will be ubiquitously outfitted with many sensors to support our daily living thorough the Internet of Things (IoT), manage infrastructure developments with cyber-physical systems (CPS), as well as provide communication through networked information fusion technology over the internet (NIFTI). This paper summarizes the panel discussions on opportunities of information fusion to the growing trends in CPS and IoT. The summary includes the concepts and areas where information supports these CPS/IoT which includes situation awareness, transportation, and smart grids.

  3. High performance parallel I/O

    CERN Document Server

    Prabhat

    2014-01-01

    Gain Critical Insight into the Parallel I/O EcosystemParallel I/O is an integral component of modern high performance computing (HPC), especially in storing and processing very large datasets to facilitate scientific discovery. Revealing the state of the art in this field, High Performance Parallel I/O draws on insights from leading practitioners, researchers, software architects, developers, and scientists who shed light on the parallel I/O ecosystem.The first part of the book explains how large-scale HPC facilities scope, configure, and operate systems, with an emphasis on choices of I/O har

  4. Development of eStudent iOS mobile application

    Directory of Open Access Journals (Sweden)

    Mladjan Antic

    2013-01-01

    Full Text Available Abstract— iOS is the Apple mobile operating system, for Apple mobile devices. Initially developed for iPhone, and later for iPod Touch, iPad, AppleTV. The Metropolitan University has a Web application titled eStudent, which enables students by Web to get information about their marks for all subjects, their financies, exam scheduling, professors and assistents, and send exam registration and feedback about teaching, etc. This paper explains the development of the mobile application eStudent on the iOS platform. This application enables students whenever they want, by using their iPhone mobile phone, to get access to the information from the eStudent Web application, and to present it on their iPhone User Interface (UI. This paper explains in details software requirements analysis, system architecture, system modelling, and UI of the eStudent iOS mobile application.

  5. DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM

    OpenAIRE

    Hongliang Liang; Yilun Xie; Yan Song

    2016-01-01

    iOS is a popular operating system on Apple’s smartphones, and recent security events have shown the possibility of stealing the users' privacy in iOS without being detected, such as XcodeGhost. So, we present the design and implementation of a malware vetting system, called DMIA. DMIA first collects runtime information of an app and then distinguish between malicious and normal apps by a novel machine learning model. We evaluated DMIA with 1000 apps from the official App Store. The results of...

  6. Effects of Data Passing Semantics and Operating System Structure on Network I/O Performance

    National Research Council Canada - National Science Library

    Brustoloni, Jose

    1997-01-01

    .... Researchers have often proposed changing the semantics of I/O data passing, so as to make copying unnecessary, or the structure of the operating system, so as to reduce or eliminate data and control passing...

  7. A Proposal for IoT Dynamic Routes Selection Based on Contextual Information.

    Science.gov (United States)

    Araújo, Harilton da Silva; Filho, Raimir Holanda; Rodrigues, Joel J P C; Rabelo, Ricardo de A L; Sousa, Natanael de C; Filho, José C C L S; Sobral, José V V

    2018-01-26

    The Internet of Things (IoT) is based on interconnection of intelligent and addressable devices, allowing their autonomy and proactive behavior with Internet connectivity. Data dissemination in IoT usually depends on the application and requires context-aware routing protocols that must include auto-configuration features (which adapt the behavior of the network at runtime, based on context information). This paper proposes an approach for IoT route selection using fuzzy logic in order to attain the requirements of specific applications. In this case, fuzzy logic is used to translate in math terms the imprecise information expressed by a set of linguistic rules. For this purpose, four Objective Functions (OFs) are proposed for the Routing Protocol for Low Power and Loss Networks (RPL); such OFs are dynamically selected based on context information. The aforementioned OFs are generated from the fusion of the following metrics: Expected Transmission Count (ETX), Number of Hops (NH) and Energy Consumed (EC). The experiments performed through simulation, associated with the statistical data analysis, conclude that this proposal provides high reliability by successfully delivering nearly 100% of data packets, low delay for data delivery and increase in QoS. In addition, an 30% improvement is attained in the network life time when using one of proposed objective function, keeping the devices alive for longer duration.

  8. A Proposal for IoT Dynamic Routes Selection Based on Contextual Information

    Directory of Open Access Journals (Sweden)

    Harilton da Silva Araújo

    2018-01-01

    Full Text Available The Internet of Things (IoT is based on interconnection of intelligent and addressable devices, allowing their autonomy and proactive behavior with Internet connectivity. Data dissemination in IoT usually depends on the application and requires context-aware routing protocols that must include auto-configuration features (which adapt the behavior of the network at runtime, based on context information. This paper proposes an approach for IoT route selection using fuzzy logic in order to attain the requirements of specific applications. In this case, fuzzy logic is used to translate in math terms the imprecise information expressed by a set of linguistic rules. For this purpose, four Objective Functions (OFs are proposed for the Routing Protocol for Low Power and Loss Networks (RPL; such OFs are dynamically selected based on context information. The aforementioned OFs are generated from the fusion of the following metrics: Expected Transmission Count (ETX, Number of Hops (NH and Energy Consumed (EC. The experiments performed through simulation, associated with the statistical data analysis, conclude that this proposal provides high reliability by successfully delivering nearly 100% of data packets, low delay for data delivery and increase in QoS. In addition, an 30% improvement is attained in the network life time when using one of proposed objective function, keeping the devices alive for longer duration.

  9. A Novel Application of CWMP: An Operator-grade Management Platform for IoT

    Directory of Open Access Journals (Sweden)

    Martin Stusek

    2016-12-01

    Full Text Available The aggressive expansion of emerging smart devices connected to the Internet infrastructure is nowadays considered as one of the most challenging components of the Internet of Things (IoT vision. As a particular segment of IoT, the smart home gateways, also named Machine-Type Communication Gateway (MTCG, become an important direction for industry including telecommunication operators. In most cases, the MTCG acts as a bridge between connected smart objects and the public network (Internet. As a consequence of the IoT domain expansion, the separate configuration of each individual Machine-to-Machine (M2M device is not feasible anymore due to steadily growing numbers of M2M nodes. To perform this task, several novel technologies have recently been introduced. However, legacy protocols and mechanisms for remote network management still retain a certain application potential for IoT. Accordingly, we have investigated the protocol TR-069 with a particular focus on its usability for MTCG. To this end, the software module (bundle based on the TR-069 for remote configuration and management of MTCG, as well as for controlling the end smart devices, has been developed. We believe that our implementation (available as open source on GitHub can serve as an important building block for efficient management of future IoT devices. Therefore, TR-069 protocol constitutes a proven and standardized technology and could be easily deployed by most of the network and service providers today. Authors would like to recall that this paper represents extended version of their previously published work at TSP 2016 conference.

  10. Fog Computing: An Overview of Big IoT Data Analytics

    Directory of Open Access Journals (Sweden)

    Muhammad Rizwan Anawar

    2018-01-01

    Full Text Available A huge amount of data, generated by Internet of Things (IoT, is growing up exponentially based on nonstop operational states. Those IoT devices are generating an avalanche of information that is disruptive for predictable data processing and analytics functionality, which is perfectly handled by the cloud before explosion growth of IoT. Fog computing structure confronts those disruptions, with powerful complement functionality of cloud framework, based on deployment of micro clouds (fog nodes at proximity edge of data sources. Particularly big IoT data analytics by fog computing structure is on emerging phase and requires extensive research to produce more proficient knowledge and smart decisions. This survey summarizes the fog challenges and opportunities in the context of big IoT data analytics on fog networking. In addition, it emphasizes that the key characteristics in some proposed research works make the fog computing a suitable platform for new proliferating IoT devices, services, and applications. Most significant fog applications (e.g., health care monitoring, smart cities, connected vehicles, and smart grid will be discussed here to create a well-organized green computing paradigm to support the next generation of IoT applications.

  11. Zabezpečení platformy iOS

    OpenAIRE

    Nidl, Michal

    2014-01-01

    This bachelor's thesis is focused on security of operating system iOS from Apple. The thesis is divided into six chapters. The first chapter describes iOS and Apple company. The second chapter deals with iOS security architecture in terms of security model and security mechanisms. The third chapter deals with the security of iOS applications and options of their testing. The fourth chapter describes software attacks against iOS in the form of malware and exploitation. The fifth chapter descri...

  12. UCH 3 and 4 plant computer system I/O point summary

    International Nuclear Information System (INIS)

    Sohn, Kwang Young; Lee, Tae Hoon; Lee, Soon Sung; Lee, Byung Chae; Yoon, Jong Keon; Park, Jeong Suk; Baek, Seung Min; Shin, Hyun Kook

    1996-05-01

    This technical report summarizes the UCN 3 and 4 I/O database points and is expected to be an important for many disciplines. There are several kind of plant tests before the commercial operation such as Preoperational Test, Cold Hydro Test (CHT), Hot Functional Test (HFT), and Power Ascension Test (PAT). Those are performed in a manner that the validity of the sensor inputs got to the Plant Computer System (PCS) and operational integrity of plant are determined by monitoring the addressable I/O point identification (PID) on the Plant Computer System operator console. For better performance of activities like Emergency Operating Procedure (EOP) computerization, Safety Parameter Display System (SPDS) development, and organizing integrated database for NSSS, referencing the past plant information about I/O database is highly expected. What's more, it is inevitable material for plant system research and general design document work to be done in future. So we present this report based on UCN database for better understanding of plant computer system. 5 refs. (Author) .new

  13. UCH 3 and 4 plant computer system I/O point summary

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Lee, Tae Hoon; Lee, Soon Sung; Lee, Byung Chae; Yoon, Jong Keon; Park, Jeong Suk; Baek, Seung Min; Shin, Hyun Kook [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1996-05-01

    This technical report summarizes the UCN 3 and 4 I/O database points and is expected to be an important for many disciplines. There are several kind of plant tests before the commercial operation such as Preoperational Test, Cold Hydro Test (CHT), Hot Functional Test (HFT), and Power Ascension Test (PAT). Those are performed in a manner that the validity of the sensor inputs got to the Plant Computer System (PCS) and operational integrity of plant are determined by monitoring the addressable I/O point identification (PID) on the Plant Computer System operator console. For better performance of activities like Emergency Operating Procedure (EOP) computerization, Safety Parameter Display System (SPDS) development, and organizing integrated database for NSSS, referencing the past plant information about I/O database is highly expected. What`s more, it is inevitable material for plant system research and general design document work to be done in future. So we present this report based on UCN database for better understanding of plant computer system. 5 refs. (Author) .new.

  14. I/O Performance Characterization of Lustre and NASA Applications on Pleiades

    Science.gov (United States)

    Saini, Subhash; Rappleye, Jason; Chang, Johnny; Barker, David Peter; Biswas, Rupak; Mehrotra, Piyush

    2012-01-01

    In this paper we study the performance of the Lustre file system using five scientific and engineering applications representative of NASA workload on large-scale supercomputing systems such as NASA s Pleiades. In order to facilitate the collection of Lustre performance metrics, we have developed a software tool that exports a wide variety of client and server-side metrics using SGI's Performance Co-Pilot (PCP), and generates a human readable report on key metrics at the end of a batch job. These performance metrics are (a) amount of data read and written, (b) number of files opened and closed, and (c) remote procedure call (RPC) size distribution (4 KB to 1024 KB, in powers of 2) for I/O operations. RPC size distribution measures the efficiency of the Lustre client and can pinpoint problems such as small write sizes, disk fragmentation, etc. These extracted statistics are useful in determining the I/O pattern of the application and can assist in identifying possible improvements for users applications. Information on the number of file operations enables a scientist to optimize the I/O performance of their applications. Amount of I/O data helps users choose the optimal stripe size and stripe count to enhance I/O performance. In this paper, we demonstrate the usefulness of this tool on Pleiades for five production quality NASA scientific and engineering applications. We compare the latency of read and write operations under Lustre to that with NFS by tracing system calls and signals. We also investigate the read and write policies and study the effect of page cache size on I/O operations. We examine the performance impact of Lustre stripe size and stripe count along with performance evaluation of file per process and single shared file accessed by all the processes for NASA workload using parameterized IOR benchmark.

  15. Building IoT Applications with Raspberry Pi and Low Power IQRF Communication Modules

    Directory of Open Access Journals (Sweden)

    Isidro Calvo

    2016-09-01

    Full Text Available Typical Internet of Things (IoT applications involve collecting information automatically from diverse geographically-distributed smart sensors and concentrating the information into more powerful computers. The Raspberry Pi platform has become a very interesting choice for IoT applications for several reasons: (1 good computing power/cost ratio; (2 high availability; it has become a de facto hardware standard; and (3 ease of use; it is based on operating systems with a big community of users. In IoT applications, data are frequently carried by means of wireless sensor networks in which energy consumption is a key issue. Energy consumption is especially relevant for smart sensors that are scattered over wide geographical areas and may need to work unattended on batteries for long intervals of time. In this scenario, it is convenient to ease the construction of IoT applications while keeping energy consumption to a minimum at the sensors. This work proposes a possible gateway implementation with specific technologies. It solves the following research question: how to build gateways for IoT applications with Raspberry Pi and low power IQRF communication modules. The following contributions are presented: (1 one architecture for IoT gateways that integrates data from sensor nodes into a higher level application based on low-cost/low-energy technologies; (2 bindings in Java and C that ease the construction of IoT applications; (3 an empirical model that describes the consumption of the communications at the nodes (smart sensors and allows scaling their batteries; and (4 validation of the proposed energy model at the battery-operated nodes.

  16. High-performance file I/O in Java : existing approaches and bulk I/O extensions.

    Energy Technology Data Exchange (ETDEWEB)

    Bonachea, D.; Dickens, P.; Thakur, R.; Mathematics and Computer Science; Univ. of California at Berkeley; Illinois Institute of Technology

    2001-07-01

    There is a growing interest in using Java as the language for developing high-performance computing applications. To be successful in the high-performance computing domain, however, Java must not only be able to provide high computational performance, but also high-performance I/O. In this paper, we first examine several approaches that attempt to provide high-performance I/O in Java - many of which are not obvious at first glance - and evaluate their performance on two parallel machines, the IBM SP and the SGI Origin2000. We then propose extensions to the Java I/O library that address the deficiencies in the Java I/O API and improve performance dramatically. The extensions add bulk (array) I/O operations to Java, thereby removing much of the overhead currently associated with array I/O in Java. We have implemented the extensions in two ways: in a standard JVM using the Java Native Interface (JNI) and in a high-performance parallel dialect of Java called Titanium. We describe the two implementations and present performance results that demonstrate the benefits of the proposed extensions.

  17. Io

    International Nuclear Information System (INIS)

    Nash, D.B.; Yoder, C.F.; Carr, M.H.; Gradie, J.; Hunten, D.M.

    1986-01-01

    The present work reviews the history of Io studies and describes the current level of understanding of Io's physics, chemistry, geology, orbital dynamics, and geophysics. Consideration is given to the satellite's internal, superficial, atmospheric, plasma, and magnetospheric properties and how they interrelate. A pictorial map of Io's surface based on Voyager 1 and 2 images is presented. It is found that Io's surface color and spectra are dominated by sulfur compounds which may include various sulfur allotropes. Volcanic processes yielding three kinds of surface features (vent regions, plains, and mountains) dominate Io's surface geology. The Io plasma torus corotates with Jupiter's magnetic field in the plane of Jupiter's centrifugal equator centered at Io's orbital radius

  18. Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT

    Directory of Open Access Journals (Sweden)

    Hyungjoo Kim

    2016-10-01

    Full Text Available The services provided to users in the environment associated with the Internet of Things (hereinafter referred to as IoT begin with the information collected from sensors. It is imperative to transmit high-quality sensor data for providing better services. It is also required to collect data only from those authenticated sensors. Moreover, it is imperative to collect high-quality data on a sustainable and continuous basis in order to provide services anytime and anywhere in the IoT environment. Therefore, high-quality, authenticated sensor networks should be constructed. The most prominent routing protocol to enhance the energy consumption efficiency for the sustainable data collection in a sensor network is the LEACH routing protocol. The LEACH routing protocol transmits sensor data by measuring the energy of sensors and allocating sensor groups dynamically. However, these sensor networks have vulnerabilities such as key leakage, eavesdropping, replay attack and relay attack, given the nature of wireless network communication. A large number of security techniques have been studied in order to solve these vulnerabilities. Nonetheless, these studies still cannot support the dynamic sensor group allocation of the LEACH routing protocol. Furthermore, they are not suitable for the sensor nodes whose hardware computing ability and energy resources are limited. Therefore, this paper proposed a group sensor communication protocol that utilizes only the four fundamental arithmetic operations and logical operation for the sensor node authentication and secure data transmission. Through the security analysis, this paper verified that the proposed scheme was secure to the vulnerabilities resulting from the nature of wireless network communication. Moreover, this paper verified through the performance analysis that the proposed scheme could be utilized efficiently.

  19. You have been Friended by the U.S. Military; Using Social Networking Services for IO Messaging

    Science.gov (United States)

    2010-12-01

    order 69 Dan Chilton, “Information Operations versus Civilian Marketing and Advertising : A Comparative...the availability of the product, its price and its place. 74 Chilton, “Information Operations versus Civilian Marketing and Advertising ,” 24. 75...Information Operations versus Civilian Marketing and Advertising : A Comparative Analysis to Improve IO Planning and Strategy.” Master of Science in

  20. Conflict Detection Algorithm to Minimize Locking for MPI-IO Atomicity

    Science.gov (United States)

    Sehrish, Saba; Wang, Jun; Thakur, Rajeev

    Many scientific applications require high-performance concurrent I/O accesses to a file by multiple processes. Those applications rely indirectly on atomic I/O capabilities in order to perform updates to structured datasets, such as those stored in HDF5 format files. Current support for atomicity in MPI-IO is provided by locking around the operations, imposing lock overhead in all situations, even though in many cases these operations are non-overlapping in the file. We propose to isolate non-overlapping accesses from overlapping ones in independent I/O cases, allowing the non-overlapping ones to proceed without imposing lock overhead. To enable this, we have implemented an efficient conflict detection algorithm in MPI-IO using MPI file views and datatypes. We show that our conflict detection scheme incurs minimal overhead on I/O operations, making it an effective mechanism for avoiding locks when they are not needed.

  1. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

    Science.gov (United States)

    Ali, Bako; Awad, Ali Ismail

    2018-03-08

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  2. A Network Coverage Information-Based Sensor Registry System for IoT Environments.

    Science.gov (United States)

    Jung, Hyunjun; Jeong, Dongwon; Lee, Sukhoon; On, Byung-Won; Baik, Doo-Kwon

    2016-07-25

    The Internet of Things (IoT) is expected to provide better services through the interaction of physical objects via the Internet. However, its limitations cause an interoperability problem when the sensed data are exchanged between the sensor nodes in wireless sensor networks (WSNs), which constitute the core infrastructure of the IoT. To address this problem, a Sensor Registry System (SRS) is used. By using a SRS, the information of the heterogeneous sensed data remains pure. If users move along a road, their mobile devices predict their next positions and obtain the sensed data for that position from the SRS. If the WSNs in the location in which the users move are unstable, the sensed data will be lost. Consider a situation where the user passes through dangerous areas. If the user's mobile device cannot receive information, they cannot be warned about the dangerous situation. To avoid this, two novel SRSs that use network coverage information have been proposed: one uses OpenSignal and the other uses the probabilistic distribution of the users accessing SRS. The empirical study showed that the proposed method can seamlessly provide services related to sensing data under any abnormal circumstance.

  3. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.

    Science.gov (United States)

    Nieto, Ana; Rios, Ruben; Lopez, Javier

    2018-02-07

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  4. Caching-Aided Collaborative D2D Operation for Predictive Data Dissemination in Industrial IoT

    OpenAIRE

    Orsino, Antonino; Kovalchukov, Roman; Samuylov, Andrey; Moltchanov, Dmitri; Andreev, Sergey; Koucheryavy, Yevgeni; Valkama, Mikko

    2018-01-01

    Industrial automation deployments constitute challenging environments where moving IoT machines may produce high-definition video and other heavy sensor data during surveying and inspection operations. Transporting massive contents to the edge network infrastructure and then eventually to the remote human operator requires reliable and high-rate radio links supported by intelligent data caching and delivery mechanisms. In this work, we address the challenges of contents dissemination in chara...

  5. Future of IoT Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Suk Kyu Lee

    2017-10-01

    Full Text Available The introduction of mobile devices has changed our daily lives. They enable users to obtain information even in a nomadic environment and provide information without limitations. A decade after the introduction of this technology, we are now facing the next innovation that will change our daily lives. With the introduction of the Internet of Things (IoT, our communication ability will not be restricted to only mobile devices. Rather, it will expand to all things with which we coexist. Many studies have discussed IoT-related services and platforms. However, there are only limited discussions about the IoT network. In this paper, we will thoroughly analyze the technical details about the IoT network. Based on our survey of papers, we will provide insight about the future IoT network and the crucial components that will enable it.

  6. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    Directory of Open Access Journals (Sweden)

    Bako Ali

    2018-03-01

    Full Text Available The Internet of Things (IoT is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  7. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    Science.gov (United States)

    2018-01-01

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. PMID:29518023

  8. Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets

    OpenAIRE

    Angrishi, Kishore

    2017-01-01

    Internet of Things (IoT) is the next big evolutionary step in the world of internet. The main intention behind the IoT is to enable safer living and risk mitigation on different levels of life. With the advent of IoT botnets, the view towards IoT devices has changed from enabler of enhanced living into Internet of vulnerabilities for cyber criminals. IoT botnets has exposed two different glaring issues, 1) A large number of IoT devices are accessible over public Internet. 2) Security (if cons...

  9. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Directory of Open Access Journals (Sweden)

    Ana Nieto

    2018-02-01

    Full Text Available IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  10. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Science.gov (United States)

    Lopez, Javier

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases. PMID:29414864

  11. Information Operations Versus Civilian Marketing and Advertising: A Comparative Analysis to Improve IO Planning and Strategy

    Science.gov (United States)

    2008-03-01

    American Marketing Association expresses fundamental principles of print advertising in a paper written by Steve Blom. Although these principles ...medium if targeting a large group of people was the intention. In addition to medium by negation, civilian marketing professors Kotler , Roberto, and...best suited for which portion of IO. 78 THIS PAGE INTENTIONALLY LEFT BLANK 79 LIST OF REFERENCES Armstrong, Gary and Kotler , Philip. Marketing

  12. FabIO

    DEFF Research Database (Denmark)

    Bergbäck Knudsen, Erik; Sørensen, Henning O.; Wright, Jonathan P.

    2013-01-01

    FabIO is a Python module written for easy and transparent reading of raw two-dimensional data from various X-ray detectors. The module provides a function for reading any image and returning a fabioimage object which contains both metadata (header information) and the raw data. All fabioimage...

  13. The Integration of DCS I/O to an Existing PLC

    Science.gov (United States)

    Sadhukhan, Debashis; Mihevic, John

    2013-01-01

    At the NASA Glenn Research Center (GRC), Existing Programmable Logic Controller (PLC) I/O was replaced with Distributed Control System (DCS) I/O, while keeping the existing PLC sequence Logic. The reason for integration of the PLC logic and DCS I/O, along with the evaluation of the resulting system is the subject of this paper. The pros and cons of the old system and new upgrade are described, including operator workstation screen update times. Detail of the physical layout and the communication between the PLC, the DCS I/O and the operator workstations are illustrated. The complex characteristics of a central process control system and the plan to remove the PLC processors in future upgrades is also discussed.

  14. iOS application security analysis

    OpenAIRE

    Βλάχος, Κωνσταντίνος Γ.; Vlachos, Konstantinos G.

    2017-01-01

    The purpose of this research is to explain the nature of the Apple iOS applications and provide all the available Open Source tools for analyzing them, starting from decrypting any application’s binary downloaded from the AppStore to reverse engineering it and even altering the flow of its running process on the actual device. We start introducing the basic theory of the iOS operating system and its applications including the security mechanisms incorporated by Apple that are a...

  15. IoT European Large-Scale Pilots – Integration, Experimentation and Testing

    OpenAIRE

    Guillén, Sergio Gustavo; Sala, Pilar; Fico, Giuseppe; Arredondo, Maria Teresa; Cano, Alicia; Posada, Jorge; Gutierrez, Germán; Palau, Carlos; Votis, Konstantinos; Verdouw, Cor N.; Wolfert, Sjaak; Beers, George; Sundmaeker, Harald; Chatzikostas, Grigoris; Ziegler, Sébastien

    2017-01-01

    The IoT European Large-Scale Pilots Programme includes the innovation consortia that are collaborating to foster the deployment of IoT solutions in Europe through the integration of advanced IoT technologies across the value chain, demonstration of multiple IoT applications at scale and in a usage context, and as close as possible to operational conditions. The programme projects are targeted, goal-driven initiatives that propose IoT approaches to specific real-life industrial/societal challe...

  16. Volcanism on Io

    Science.gov (United States)

    Davies, Ashley Gerard

    2014-03-01

    Preface; Introduction; Part I. Io, 1610 to 1995: Galileo to Galileo: 1. Io, 1610-1979; 2. Between Voyager and Galileo: 1979-95; 3. Galileo at Io; Part II. Planetary Volcanism: Evolution and Composition: 4. Io and Earth: formation, evolution, and interior structure; 5. Magmas and volatiles; Part III. Observing and Modeling Volcanic Activity: 6. Observations: thermal remote sensing of volcanic activity; 7. Models of effusive eruption processes; 8. Thermal evolution of volcanic eruptions; Part IV. Galileo at Io: the Volcanic Bestiary: 9. The view from Galileo; 10. The lava lake at Pele; 11. Pillan and Tvashtar: lava fountains and flows; 12. Prometheus and Amirani: Effusive activity and insulated flows; 13. Loki Patera: Io's powerhouse; 14. Other volcanoes and eruptions; Part V. Volcanism on Io: The Global View: 15. Geomorphology: paterae, shields, flows and mountains; 16. Volcanic plumes; 17. Hot spots; Part VI. Io after Galileo: 18. Volcanism on Io: a post-Galileo view; 19. The future of Io observations; Appendix 1; Appendix 2; References; Index.

  17. OS X and iOS Kernel Programming

    CERN Document Server

    Halvorsen, Ole Henry

    2011-01-01

    OS X and iOS Kernel Programming combines essential operating system and kernel architecture knowledge with a highly practical approach that will help you write effective kernel-level code. You'll learn fundamental concepts such as memory management and thread synchronization, as well as the I/O Kit framework. You'll also learn how to write your own kernel-level extensions, such as device drivers for USB and Thunderbolt devices, including networking, storage and audio drivers. OS X and iOS Kernel Programming provides an incisive and complete introduction to the XNU kernel, which runs iPhones, i

  18. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    OpenAIRE

    Ana Nieto; Ruben Rios; Javier Lopez

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntar...

  19. The Method of System Test using I/O Stimulator

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jang Yeol; Lee, Dong Young; Kim, Chang Hoi [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    In general, the software development life cycle consists of the requirement phase, design phase, implementation phase, testing phase, integration phase (software-software integration, software-hardware integration), installation phase, and operation and maintenance phase. The fundamental parts to the testing phase are component test, software integration test, software hardware integration test, and system test. Among these tests, we focused in particular on system test using I/O stimulator. The system test operates the functionality, performance, and interface because system testing falls within the scope of black box testing, which should not require knowledge of the inner design of the code or logic. The purpose of developing a system test using a I/O stimulator is to save time and effort from the functionality and performance tests. We developed an I/O stimulator for the burning system test based on the operational scenario. The hardware, software, and manmachine- interface (MMI) are fundamental parts to the I/O stimulator. Signal sources from the I/O stimulator contain analog input, analog output, digital input, digital output, a Programmable Power Supply, an RS232C Serial interface and a dual port Ethernet interface. While automation cannot reproduce everything that a software engineer can do, it can be extremely useful for the system test. However, it does require the test criteria and a well-developed test suite of the testing scripts in order to be useful. In this study, we developed a multipurpose and cost-efficient I/O stimulator using LabVIEW program instead of the testing scripts.

  20. The Method of System Test using I/O Stimulator

    International Nuclear Information System (INIS)

    Kim, Jang Yeol; Lee, Dong Young; Kim, Chang Hoi

    2016-01-01

    In general, the software development life cycle consists of the requirement phase, design phase, implementation phase, testing phase, integration phase (software-software integration, software-hardware integration), installation phase, and operation and maintenance phase. The fundamental parts to the testing phase are component test, software integration test, software hardware integration test, and system test. Among these tests, we focused in particular on system test using I/O stimulator. The system test operates the functionality, performance, and interface because system testing falls within the scope of black box testing, which should not require knowledge of the inner design of the code or logic. The purpose of developing a system test using a I/O stimulator is to save time and effort from the functionality and performance tests. We developed an I/O stimulator for the burning system test based on the operational scenario. The hardware, software, and manmachine- interface (MMI) are fundamental parts to the I/O stimulator. Signal sources from the I/O stimulator contain analog input, analog output, digital input, digital output, a Programmable Power Supply, an RS232C Serial interface and a dual port Ethernet interface. While automation cannot reproduce everything that a software engineer can do, it can be extremely useful for the system test. However, it does require the test criteria and a well-developed test suite of the testing scripts in order to be useful. In this study, we developed a multipurpose and cost-efficient I/O stimulator using LabVIEW program instead of the testing scripts

  1. Improving Operational System Performance of Internet of Things (IoT) in Indonesia Telecomunication Company

    Science.gov (United States)

    Dachyar, M.; Risky, S. A.

    2014-06-01

    Telecommunications company have to improve their business performance despite of the increase customers every year. In Indonesia, the telecommunication company have provided best services, improving operational systems by designing a framework for operational systems of the Internet of Things (IoT) other name of Machine to Machine (M2M). This study was conducted with expert opinion which further processed by the Analytic Hierarchy Process (AHP) to obtain important factor for organizations operational systems, and the Interpretive Structural Modeling (ISM) to determine factors of organization which found drives the biggest power. This study resulted, the greatest weight of SLA & KPI handling problems. The M2M current dashboard and current M2M connectivity have power to affect other factors and has important function for M2M operations roomates system which can be effectively carried out.

  2. Enhancing Privacy in Wearable IoT through a Provenance Architecture

    Directory of Open Access Journals (Sweden)

    Richard K. Lomotey

    2018-04-01

    Full Text Available The Internet of Things (IoT is inspired by network interconnectedness of humans, objects, and cloud services to facilitate new use cases and new business models across multiple enterprise domains including healthcare. This creates the need for continuous data streaming in IoT architectures which are mainly designed following the broadcast model. The model facilitates IoT devices to sense and deliver information to other nodes (e.g., cloud, physical objects, etc. that are interested in the information. However, this is a recipe for privacy breaches since sensitive data, such as personal vitals from wearables, can be delivered to undesired sniffing nodes. In order to protect users’ privacy and manufacturers’ IP, as well as detecting and blocking malicious activity, this research paper proposes privacy-oriented IoT architecture following the provenance technique. This ensures that the IoT data will only be delivered to the nodes that subscribe to receive the information. Using the provenance technique to ensure high transparency, the work is able to provide trace routes for digital audit trail. Several empirical evaluations are conducted in a real-world wearable IoT ecosystem to prove the superiority of the proposed work.

  3. Green IoT: An Investigation on Energy Saving Practices for 2020 and Beyond

    OpenAIRE

    Arshad, R.; Zahoor, S.; Shah, M.A.; Wahid, A.; Yu, Hongnian

    2017-01-01

    Internet of Things (IoT) is an emerging concept which aims to connect billions of devices with each other. The IoT devices sense, collect and transmit important information from their surroundings. This exchange of very large amount of information amongst billions of devices creates a massive energy need. Green IoT envisions the concept of reducing the energy consumption of IoT devices and making the environment safe. Inspired by achieving a sustainable environment for IoT, we first give the ...

  4. Nanosatellites constellation as an IoT communication platform for near equatorial countries

    Science.gov (United States)

    Narayanasamy, A.; Ahmad, Y. A.; Othman, M.

    2017-11-01

    Anytime, anywhere access for real-time intelligence by Internet of Things (IoT) is changing the way that the whole world will operate as it moves toward data driven technologies. Over the next five years, IoT related devices going to have a dramatic breakthrough in current and new applications, not just on increased efficiency and cost reduction on current system, but it also will make trillion-dollar revenue generation and improve customer satisfaction. IoT communications is the networking of intelligent devices which enables data collection from remote assets. It covers a broad range of technologies and applications which connect to the physical world while allowing key information to be transferred automatically. The current terrestrial wireless communications technologies used to enable this connectivity include GSM, GPRS, 3G, LTE, WIFI, WiMAX and LoRa. These connections occur short to medium range distance however, none of them can cover a whole country or continent and the networks are getting congested with the multiplication of IoT devices. In this study, we discuss a conceptual design of a nanosatellite constellation those can provide a space-based communication platform for IoT devices for near Equatorial countries. The constellation design i.e. the orbital plane and number of satellites and launch deployment concepts are presented.

  5. TMACS I/O termination point listing. Revision 1

    International Nuclear Information System (INIS)

    Scaief, C.C. III.

    1994-01-01

    This document provides a listing of all analog and discrete input/output (I/O) points connected to the Tank Monitor and Control System (TMACS). The list also provides other information such as the point tag name, termination location, description, drawing references and other parameters. The purpose is to define each point's unique tag name and to cross reference the point with other associated information that may be necessary for activities such as maintenance, calibration, diagnostics, or design changes. It provides a list in one document of all I/O points that would otherwise only be available by referring to all I/O termination drawings

  6. TMACS I/O termination point listing. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Scaief, C.C. III

    1994-09-13

    This document provides a listing of all analog and discrete input/output (I/O) points connected to the Tank Monitor and Control System (TMACS). The list also provides other information such as the point tag name, termination location, description, drawing references and other parameters. The purpose is to define each point`s unique tag name and to cross reference the point with other associated information that may be necessary for activities such as maintenance, calibration, diagnostics, or design changes. It provides a list in one document of all I/O points that would otherwise only be available by referring to all I/O termination drawings.

  7. IoT Contextual Factors on Healthcare.

    Science.gov (United States)

    Michalakis, Konstantinos; Caridakis, George

    2017-01-01

    With the emergence of the Internet of Things, new services in healthcare will be available and existing systems will be integrated in the IoT framework, providing automated medical supervision and efficient medical treatment. Context awareness plays a critical role in realizing the vision of the IoT, providing rich contextual information that can help the system act more efficiently. Since context in healthcare has its unique characteristics, it is necessary to define an appropriate context aware framework for healthcare IoT applications. We identify this context as perceived in healthcare applications and describe the context aware procedures. We also present an architecture that connects the sensors that measure biometric data with the sensory networks of the environment and the various IoT middleware that reside in the geographical area. Finally, we discuss the challenges for the realization of this vision.

  8. iOS app development portable genius

    CERN Document Server

    Wentk, Richard

    2012-01-01

    The essential skills and technologies needed for iOS development in one handy guide! The unprecedented popularity of iOS devices, such as the iPhone, iPad, and iPod touch, has led to a development boom. If you’re eager to become part of the action, then this is the book for you! Packed with must-have information on iOS development, this handy guide covers Objective-C, Xcode, Frameworks, and sound design principles and explains how to upload an app to the app store and integrate apps with the latest advances that Apple offers developers. The featured tips and tricks will get you up and ru

  9. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    Science.gov (United States)

    2006-09-01

    Information Operations IW Information Warfare JDAM Joint Direct Attack Munition JRFL Joint Restricted Frequency List JSTARS Joint...through the preparation of the joint restricted frequency list (JRFL), which includes taboo, guarded and protected frequencies. The EC-130H Compass Call

  10. iOS 7 programming pushing the limits

    CERN Document Server

    Napier, Rob

    2014-01-01

    Get ready to create killer apps for iPad and iPhone on the new iOS 7! With Apple's introduction of iOS 7, demand for developers who know the new iOS will be high. You need in-depth information about the new characteristics and capabilities of iOS 7, and that's what you'll find in this book. If you have experience with C or C++, this guide will show you how to create amazing apps for iPhone, iPad, and iPod touch. You'll also learn to maximize your programs for mobile devices using iPhone SDK 7.0. Advanced topics such as security services, running on multiple iPlatforms, and local networking w

  11. Smart Collaborative Caching for Information-Centric IoT in Fog Computing

    Directory of Open Access Journals (Sweden)

    Fei Song

    2017-11-01

    Full Text Available The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies.

  12. Smart Collaborative Caching for Information-Centric IoT in Fog Computing.

    Science.gov (United States)

    Song, Fei; Ai, Zheng-Yang; Li, Jun-Jie; Pau, Giovanni; Collotta, Mario; You, Ilsun; Zhang, Hong-Ke

    2017-11-01

    The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT) urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN) is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC) scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies.

  13. Smart Collaborative Caching for Information-Centric IoT in Fog Computing

    Science.gov (United States)

    Song, Fei; Ai, Zheng-Yang; Li, Jun-Jie; Zhang, Hong-Ke

    2017-01-01

    The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT) urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN) is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC) scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies. PMID:29104219

  14. An Application-Driven Modular IoT Architecture

    Directory of Open Access Journals (Sweden)

    Kumar Yelamarthi

    2017-01-01

    Full Text Available Building upon the advancements in the recent years, a new paradigm in technology has emerged in Internet of Things (IoT. IoT has allowed for communication with the surrounding environment through a multitude of sensors and actuators, yet operating on limited energy. Several researchers have presented IoT architectures for respective applications, often challenged by requiring major updates for adoption to a different application. Further, this comes with several uncertainties such as type of computational device required at the edge, mode of wireless connectivity required, methods to obtain power efficiency, and not ensuring rapid deployment. This paper starts with providing a horizontal overview of each layer in IoT architecture and options for different applications. Then it presents a broad application-driven modular architecture, which can be easily customized for rapid deployment. This paper presents the diverse hardware used in several IoT layers such as sensors, embedded processors, wireless transceivers, internet gateway, and application management cloud server. Later, this paper presents implementation results for diverse applications including healthcare, structural health monitoring, agriculture, and indoor tour guide systems. It is hoped that this research will assist the potential user to easily choose IoT hardware and software as it pertains to their respective needs.

  15. Io after Galileo

    International Nuclear Information System (INIS)

    Lopes, Rosaly M C; Williams, David A

    2005-01-01

    Io, the volcanically active innermost large moon of Jupiter, was a target of intense study during the recently completed NASA Galileo mission to Jupiter (1989-2003). Galileo's suite of instruments obtained unprecedented observations of Io, including high spatial resolution imaging in the visible and infrared. This paper reviews the insights gained about Io's surface, atmosphere and space environment during the Galileo mission. Io is thought to have a large Fe-FeS core, whose radius is slightly less than half the radius of Io and whose mass is 20% of the moon. The lack of an intrinsic magnetic field implies that the core is either completely solid or completely liquid. The mantle of Io appears to undergo a high degree of partial melting (20-50% molten) that produces ultramafic lavas dominated by Mg-rich orthopyroxene in an apparent 'mushy magma ocean', suggesting an undifferentiated mantle. The crust of Io is thought to be rigid, 20-30 km thick, cold away from volcanic heat sources and composed of mafic to ultramafic silicates. Tidal flexing due to Io's orbital resonance produces ∼100 m tides at the surface, generating heat that powers Io's volcanism. Silicate volcanism appears to be dominant at most hot spots, although secondary sulfur volcanism may be important in some areas. The key discoveries of the Galileo era at Io were: (1) the detection of high-temperature volcanism (ultramafic, superheated mafic or 'ceramic'); (2) the detection of both S 2 and SO 2 gas in Ionian plumes; (3) the distinction between eruption styles, including between Pelean plumes (originating from central vents) and Promethean plumes (originating from silicate lava flow fronts); (4) the relationship between mountains and paterae, which indicates that many paterae are formed as magma preferentially ascends along tectonic faults associated with mountain building; (5) the lack of detection of an intrinsic magnetic field; (6) a new estimate of global heat flow; and (7) increased understanding

  16. FIRE - Flyby of Io with Repeat Encounters: A conceptual design for a New Frontiers mission to Io

    Science.gov (United States)

    Suer, Terry-Ann; Padovan, Sebastiano; Whitten, Jennifer L.; Potter, Ross W. K.; Shkolyar, Svetlana; Cable, Morgan; Walker, Catherine; Szalay, Jamey; Parker, Charles; Cumbers, John; Gentry, Diana; Harrison, Tanya; Naidu, Shantanu; Trammell, Harold J.; Reimuller, Jason; Budney, Charles J.; Lowes, Leslie L.

    2017-09-01

    A conceptual design is presented for a low complexity, heritage-based flyby mission to Io, Jupiter's innermost Galilean satellite and the most volcanically active body in the Solar System. The design addresses the 2011 Decadal Survey's recommendation for a New Frontiers class mission to Io and is based upon the result of the June 2012 NASA-JPL Planetary Science Summer School. A science payload is proposed to investigate the link between the structure of Io's interior, its volcanic activity, its surface composition, and its tectonics. A study of Io's atmospheric processes and Io's role in the Jovian magnetosphere is also planned. The instrument suite includes a visible/near-IR imager, a magnetic field and plasma suite, a dust analyzer, and a gimbaled high gain antenna to perform radio science. Payload activity and spacecraft operations would be powered by three Advanced Stirling Radioisotope Generators (ASRG). The primary mission includes 10 flybys with close-encounter altitudes as low as 100 km. The mission risks are mitigated by ensuring that relevant components are radiation tolerant and by using redundancy and flight-proven parts in the design. The spacecraft would be launched on an Atlas V rocket with a delta-v of 1.3 km/s. Three gravity assists (Venus, Earth, Earth) would be used to reach the Jupiter system in a 6-year cruise. The resulting concept demonstrates the rich scientific return of a flyby mission to Io.

  17. An iOS implementation of the Shannon switching game

    OpenAIRE

    Macík, Miroslav

    2013-01-01

    Shannon switching game is a logical graph game for two players. The game was created by American mathematician Claude Shannon. iOS is an operating system designed for iPhone cellular phone, iPod music player and iPad tablet. The thesis describes existing implementations of the game and also specific implementation for iOS operating system created as a part of this work. This implementation allows you to play against virtual opponent and also supports multiplayer game consisting of two players...

  18. Research on offense and defense technology for iOS kernel security mechanism

    Science.gov (United States)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  19. Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android.

    Science.gov (United States)

    Dehling, Tobias; Gao, Fangjian; Schneider, Stephan; Sunyaev, Ali

    2015-01-19

    Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. We assessed apps available in English and offered in the categories "Medical" and "Health & Fitness" in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose at least some potential damage through

  20. In-Network Data Processing in Software-Defined IoT with a Programmable Data Plane

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2018-01-01

    Full Text Available Making an SDN data plane flexible enough to satisfy the various requirements of heterogeneous IoT applications is very desirable in terms of software-defined IoT (SD-IoT networking. Network devices with a programmable data plane provide an ability to dynamically add new packet- and data-processing procedures to IoT applications. The previously proposed solutions for the addition of the programmability feature to the SDN data plane provide extensibility for the packet-forwarding operations of new protocols, but IoT applications need a more flexible programmability for in-network data-processing operations (e.g., the sensing-data aggregation from thousands of sensor nodes. Moreover, some IoT models such as OMG DDS, oneM2M, and Eclipse SCADA use the publish-subscribe model that is difficult to represent using the operations of the existing message-centric data-plane models. We introduce a new in-network data-processing scheme for the SD-IoT data plane that defines an event-driven data-processing model that can express a variety of in-network data-processing cases in the SD-IoT environment. Also, the proposed model comprises a language for the programming of the data-processing procedures, while a flexible data-plane structure that can install and execute the programs at runtime is additionally presented. We demonstrate the flexibility of the proposed scheme by using sample programs in a number of example SD-IoT cases.

  1. Two Word CAMAC I/O module

    International Nuclear Information System (INIS)

    Barker, L.L.

    1981-05-01

    This note describes the 2 Word I/O subsystem and details its operating characteristics. SLAC drawings in the 926-306 series support this device and should be referenced for construction and connection details

  2. Remote I/O : fast access to distant storage.

    Energy Technology Data Exchange (ETDEWEB)

    Foster, I.; Kohr, D., Jr.; Krishnaiyer, R.; Mogill, J.

    1997-12-17

    As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally addressed this problem by manually staging data to and from remote computers. We argue instead for a new remote I/O paradigm in which programs use familiar parallel I/O interfaces to access remote file systems. In addition to simplifying remote execution, remote I/O can improve performance relative to staging by overlapping computation and data transfer or by reducing communication requirements. However, remote I/O also introduces new technical challenges in the areas of portability, performance, and integration with distributed computing systems. We propose techniques designed to address these challenges and describe a remote I/O library called RIO that we have developed to evaluate the effectiveness of these techniques. RIO addresses issues of portability by adopting the quasi-standard MPI-IO interface and by defining a RIO device and RIO server within the ADIO abstract I/O device architecture. It addresses performance issues by providing traditional I/O optimizations such as asynchronous operations and through implementation techniques such as buffering and message forwarding to off load communication overheads. RIO uses the Nexus communication library to obtain access to configuration and security mechanisms provided by the Globus wide area computing tool kit. Microbenchmarks and application experiments demonstrate that our techniques achieve acceptable performance in most situations and can improve turnaround time relative to staging.

  3. Rojas novada tūrisma iOS lietotnes izveide

    OpenAIRE

    Baurovskis, Armands

    2013-01-01

    Kvalifikācijas darbā – „Rojas novada tūrisma iOS lietotnes izveide” ir izstrādāta Rojas novada tūrisma lietotne iOS operētājsistēmai – „Roja Travel Guide”. Izstrāde tika veikta ar spējo programmatūras izstrādes metodi. Lietotne nodrošina informāciju divās valodās – latviešu un angļu – par Rojas novada tūrisma objektiem, kā arī ļauj lasīt jaunākās ziņas, kas ir saistītas ar novadu. Lietotne ir paredzēta tūristiem un vietējiem iedzīvotājiem. Lietotne strādā pilnvērtīgi uz visiem iPhone un iPad ...

  4. IoT Architectural Framework: Connection and Integration Framework for IoT Systems

    OpenAIRE

    Uviase, Onoriode; Kotonya, Gerald

    2018-01-01

    The proliferation of the Internet of Things (IoT) has since seen a growing interest in architectural design and adaptive frameworks to promote the connection between heterogeneous IoT devices and IoT systems. The most widely favoured software architecture in IoT is the Service Oriented Architecture (SOA), which aims to provide a loosely coupled systems to leverage the use and reuse of IoT services at the middle-ware layer, to minimise system integration problems. However, despite the flexibil...

  5. BRC/IoP standard importance in packaging quality assurance

    Directory of Open Access Journals (Sweden)

    Agnieszka Kawecka

    2014-10-01

    Full Text Available BRC/IoP (British Retail Consortium / Institute of Packaging is the only industry standard dedicated entrepreneurs operating in the packaging industry, primarily intended for contact with food. The requirements of the BRC / IoP guarantee the safety of packaging and fulfillment of all legal and hygienic requirements. The article presents the main features of the standard, the basic requirements contained in the document and the results of research on the implementation of quality management systems, including standard BRC / IoP and the actions that are required checklists. It is noticeable that there is little interest in certification BRC / IoP, due to low awareness of the standard, despite the fulfillment of some of the basic requirements of the surveyed companies.

  6. Ultra-low power analog-digital converters for IoT

    NARCIS (Netherlands)

    Harpe, P.J.A.; Alioto, Massimo

    2017-01-01

    This chapter addresses ADCs for IoT nodes, which are needed to digitize sensor information before processing, storage or wireless transmission. ADCs are also required for the radio communication channel. This chapter focusses on successive approximation (SAR) ADCs, a popular architecture for IoT

  7. Loose-Lipped Mobile Device Intelligent Personal Assistants: A Discussion of Information Gleaned from Siri on Locked iOS Devices.

    Science.gov (United States)

    Horsman, Graeme

    2018-04-23

    The forensic analysis of mobile handsets is becoming a more prominent factor in many criminal investigations. Despite such devices frequently storing relevant evidential content to support an investigation, accessing this information is becoming an increasingly difficult task due to enhanced effective security features. Where access to a device's resident data is not possible via traditional mobile forensic methods, in some cases it may still be possible to extract user information via queries made to an installed intelligent personal assistant. This article presents an evaluation of the information which is retrievable from Apple's Siri when interacted with on a locked iOS device running iOS 11.2.5 (the latest at the time of testing). The testing of verbal commands designed to elicit a response from Siri demonstrate the ability to recover call log, SMS, Contacts, Apple Maps, Calendar, and device information which may support any further investigation. © 2018 American Academy of Forensic Sciences.

  8. Benchmarking Distributed Stream Processing Platforms for IoT Applications

    OpenAIRE

    Shukla, Anshu; Simmhan, Yogesh

    2016-01-01

    Internet of Things (IoT) is a technology paradigm where millions of sensors monitor, and help inform or manage, physical, envi- ronmental and human systems in real-time. The inherent closed-loop re- sponsiveness and decision making of IoT applications makes them ideal candidates for using low latency and scalable stream processing plat- forms. Distributed Stream Processing Systems (DSPS) are becoming es- sential components of any IoT stack, but the efficacy and performance of contemporary DSP...

  9. IoT gateway architecture

    OpenAIRE

    Leleika, Paulius

    2017-01-01

    This paper provides an overview of HTTP, CoAP, AMQP, DDS, MQTT, XMPP communication protocols. The main IoT problem is that IoT devices uses many different communication protocols and devices cannot communicate with each other directly. IoT gateway helps to solve that problem. This paper also identifies requirements for IoT gateway software. Provides solution for communication between devices which are using different messaging architectures. Presents security aspects and ways to secure IoT ga...

  10. IoT for Smart Living

    Indian Academy of Sciences (India)

    Professor. Robert Bosch Centre for Cyber-Physical Systems, ... Develop Information models/Knowledge structures to capture “Cities” to enable Intelligent apps. IoT Technology is now easily accessible for anyone to experiment with. Build very ...

  11. Potenciál IoT v Smart city

    OpenAIRE

    Pavlíček, Tomáš

    2016-01-01

    The aim of this masters thesis is to identify, in which phase of adoption of Internet of Things (IoT) application areas of concept Smart City are nowadays Czech regional cities, what is their outlook to 2025 and also identify in which dimensions of concept Smart city, supported by IoT technologies, perceive Czech regional cities the greatest potential. Based on information obtained from the studied materials, the concept of Internet of Things (IoT) is described, along with a detailed descript...

  12. Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android

    Science.gov (United States)

    Dehling, Tobias; Gao, Fangjian; Schneider, Stephan

    2015-01-01

    Background Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. Objective The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. Methods We assessed apps available in English and offered in the categories “Medical” and “Health & Fitness” in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. Results We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose

  13. Dominating Duffer’s Domain: Lessons for the U.S. Marine corps Information Operations Practitioner

    Science.gov (United States)

    2017-01-01

    has learned 26 hard -won lessons that readers may find useful for the future conduct and planning of IO. The principles espoused here were derived from...to be frank, it wasn’t that hard . I had done the ten-day Intermediate MAGTF (Marine Air Ground Task Force) Information Operations Practitioner...paragraph, with no phases. It was, however, beauti- fully formatted , and the task listing had everything: military deception, electronic warfare, OPSEC

  14. EDGE TECHNOLOGIES IN IoT AND APPLICATION SCENARIO OF RFID BASED IoT

    OpenAIRE

    Dharam Gami *, Asst. Prof. Dhaval Nimavat, Asst. Prof. Shubham Sharma

    2016-01-01

    Internet of Things possesses the power to change the era. IoT will offer an advance connectivity between objects which will change the face of machine-to-machine communication. IoT will connect autonomous systems, devices and heterogeneous machines and make them communicate without human interactions. Many technologies will play significant role in IoT implementation. In this paper, we aim to describe the candidate of edge technologies in IoT and demonstrate how RFID based IoT system will loo...

  15. A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, l...

  16. UbiCompass: An IoT Interaction Concept

    Directory of Open Access Journals (Sweden)

    Günter Alce

    2018-01-01

    Full Text Available Lately, different wearable form factors have reached the consumer domain. Wearables enable at-a-glance access to information and can continually sense the surrounding environment. Internet of Things (IoT researchers have focused on the main enabling factors: the integration of several technologies and communication solutions. Less effort has been devoted to exploring how not-so-tech-savvy end users can discover and directly interact with the numerous connected things predicted by the IoT vision. This paper presents a novel IoT interaction concept called UbiCompass. A functional, smartwatch face prototype of the UbiCompass was developed and integrated with an existing smart home system, in which five different connected devices could be controlled using simple interaction. It was then compared to a traditional smartphone mobile application in a controlled experiment. The results show statistically significant differences in favor of the proposed concept. This highlights the potential the UbiCompass has as an IoT interaction concept.

  17. iOS cloud development dor dummies

    CERN Document Server

    Goldstein, Neal

    2012-01-01

    Want to create robust, data-driven, iOS cloud apps? This book makes it easier! Apple's mobile operating system (iOS) supports iPhones, iPads, iPods and other Apple devices, and while even beginners can now develop apps to run just on these devices themselves, sometimes you want to create an app with more heft. Applications such as live weather reports or multi-player games require a lot of data to be pulled from outside—often from cloud-based Web Services, such as Google or Amazon. This book, written by application development experts Sujee Maniyam and Neal Goldstein, shows you how to we

  18. AntibIoTic: Protecting IoT Devices Against DDoS Attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing...... availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices....

  19. Enabling IoT ecosystems through platform interoperability

    OpenAIRE

    Bröring, Arne; Schmid, Stefan; Schindhelm, Corina-Kim; Khelil, Abdelmajid; Kabisch, Sebastian; Kramer, Denis; Le Phuoc, Danh; Mitic, Jelena; Anicic, Darko; Teniente López, Ernest

    2017-01-01

    Today, the Internet of Things (IoT) comprises vertically oriented platforms for things. Developers who want to use them need to negotiate access individually and adapt to the platform-specific API and information models. Having to perform these actions for each platform often outweighs the possible gains from adapting applications to multiple platforms. This fragmentation of the IoT and the missing interoperability result in high entry barriers for developers and prevent the emergence of broa...

  20. Io's Pele Hemisphere

    Science.gov (United States)

    1996-01-01

    Jupiter's moon Io with Pele prominently in view. The inset images are from the Voyager 1 (top) and 2 (bottom) spacecraft using the violet, blue, and orange filters. The large image is from Galileo, using the violet, green, and red filters. The colors in the Galileo image are closer to what the human eye would see. With the filters used in the Solid State Imaging system on Galileo, it is clear now that some of the recent volcanic deposits on Io are indeed very red, a point not resolved by Voyager. Scientists speculate that the red deposits are a form of Sulfur produced in volcanic eruptions on Io. Note the rapid changes seen in the shape of the distal (far from the vent) plume deposits from Pele between Voyagers 1 (April, 1979) and 2 (July, 1979). The Galileo image was obtained by the imaging system on board the spacecraft in June, 1996. North is to the top.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA'is Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can be found at URL http://www.jpl.nasa.gov/galileo/sepo

  1. There is no I/O like no I/O

    International Nuclear Information System (INIS)

    Johnston, T.Y.

    1985-01-01

    On most computer systems the most common cause of performance degradation is I/O contention. This paper will examine some efforts that can be taken in a VM environment to reduce I/O or its effect at both the global and local levels

  2. AP-IO: asynchronous pipeline I/O for hiding periodic output cost in CFD simulation.

    Science.gov (United States)

    Xiaoguang, Ren; Xinhai, Xu

    2014-01-01

    Computational fluid dynamics (CFD) simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO) optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  3. AP-IO: Asynchronous Pipeline I/O for Hiding Periodic Output Cost in CFD Simulation

    Directory of Open Access Journals (Sweden)

    Ren Xiaoguang

    2014-01-01

    Full Text Available Computational fluid dynamics (CFD simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  4. IoT-based Asset Management System for Healthcare-related Industries

    Directory of Open Access Journals (Sweden)

    Lee Carman Ka Man

    2015-11-01

    Full Text Available The healthcare industry has been focusing efforts on optimizing inventory management procedures through the incorporation of Information and Communication Technology, in the form of tracking devices and data mining, to establish ideal inventory models. In this paper, a roadmap is developed towards a technological assessment of the Internet of Things (IoT in the healthcare industry, 2010–2020. According to the roadmap, an IoT-based healthcare asset management system (IoT-HAMS is proposed and developed based on Artificial Neural Network (ANN and Fuzzy Logic (FL, incorporating IoT technologies for asset management to optimize the supply of resources.

  5. A Reference Model for Monitoring IoT WSN-Based Applications.

    Science.gov (United States)

    Capella, Juan Vicente; Campelo, José Carlos; Bonastre, Alberto; Ors, Rafael

    2016-10-30

    The Internet of Things (IoT) is, at this moment, one of the most promising technologies that has arisen for decades. Wireless Sensor Networks (WSNs) are one of the main pillars for many IoT applications, insofar as they require to obtain context-awareness information. The bibliography shows many difficulties in their real implementation that have prevented its massive deployment. Additionally, in IoT environments where data producers and data consumers are not directly related, compatibility and certification issues become fundamental. Both problems would profit from accurate knowledge of the internal behavior of WSNs that must be obtained by the utilization of appropriate tools. There are many ad-hoc proposals with no common structure or methodology, and intended to monitor a particular WSN. To overcome this problem, this paper proposes a structured three-layer reference model for WSN Monitoring Platforms (WSN-MP), which offers a standard environment for the design of new monitoring platforms to debug, verify and certify a WSN's behavior and performance, and applicable to every WSN. This model also allows the comparative analysis of the current proposals for monitoring the operation of WSNs. Following this methodology, it is possible to achieve a standardization of WSN-MP, promoting new research areas in order to solve the problems of each layer.

  6. Application-Tailored I/O with Streamline

    NARCIS (Netherlands)

    de Bruijn, W.J.; Bos, H.J.; Bal, H.E.

    2011-01-01

    Streamline is a stream-based OS communication subsystem that spans from peripheral hardware to userspace processes. It improves performance of I/O-bound applications (such as webservers and streaming media applications) by constructing tailor-made I/O paths through the operating system for each

  7. Enabling Large-Scale IoT-Based Services through Elastic Publish/Subscribe.

    Science.gov (United States)

    Vavassori, Sergio; Soriano, Javier; Fernández, Rafael

    2017-09-19

    In this paper, we report an algorithm that is designed to leverage the cloud as infrastructure to support Internet of Things (IoT) by elastically scaling in/out so that IoT-based service users never stop receiving sensors' data. This algorithm is able to provide an uninterrupted service to end users even during the scaling operation since its internal state repartitioning is transparent for publishers or subscribers; its scaling operation is time-bounded and depends only on the dimension of the state partitions to be transmitted to the different nodes. We describe its implementation in E-SilboPS, an elastic content-based publish/subscribe (CBPS) system specifically designed to support context-aware sensing and communication in IoT-based services. E-SilboPS is a key internal asset of the FIWARE IoT services enablement platform, which offers an architecture of components specifically designed to capture data from, or act upon, IoT devices as easily as reading/changing the value of attributes linked to context entities. In addition, we discuss the quantitative measurements used to evaluate the scale-out process, as well as the results of this evaluation. This new feature rounds out the context-aware content-based features of E-SilboPS by providing, for example, the necessary middleware for constructing dashboards and monitoring panels that are capable of dynamically changing queries and continuously handling data in IoT-based services.

  8. Research and design of smart grid monitoring control via terminal based on iOS system

    Science.gov (United States)

    Fu, Wei; Gong, Li; Chen, Heli; Pan, Guangji

    2017-06-01

    Aiming at a series of problems existing in current smart grid monitoring Control Terminal, such as high costs, poor portability, simple monitoring system, poor software extensions, low system reliability when transmitting information, single man-machine interface, poor security, etc., smart grid remote monitoring system based on the iOS system has been designed. The system interacts with smart grid server so that it can acquire grid data through WiFi/3G/4G networks, and monitor each grid line running status, as well as power plant equipment operating conditions. When it occurs an exception in the power plant, incident information can be sent to the user iOS terminal equipment timely, which will provide troubleshooting information to help the grid staff to make the right decisions in a timely manner, to avoid further accidents. Field tests have shown the system realizes the integrated grid monitoring functions, low maintenance cost, friendly interface, high security and reliability, and it possesses certain applicable value.

  9. Semantic Interoperability in Heterogeneous IoT Infrastructure for Healthcare

    Directory of Open Access Journals (Sweden)

    Sohail Jabbar

    2017-01-01

    Full Text Available Interoperability remains a significant burden to the developers of Internet of Things’ Systems. This is due to the fact that the IoT devices are highly heterogeneous in terms of underlying communication protocols, data formats, and technologies. Secondly due to lack of worldwide acceptable standards, interoperability tools remain limited. In this paper, we proposed an IoT based Semantic Interoperability Model (IoT-SIM to provide Semantic Interoperability among heterogeneous IoT devices in healthcare domain. Physicians communicate their patients with heterogeneous IoT devices to monitor their current health status. Information between physician and patient is semantically annotated and communicated in a meaningful way. A lightweight model for semantic annotation of data using heterogeneous devices in IoT is proposed to provide annotations for data. Resource Description Framework (RDF is a semantic web framework that is used to relate things using triples to make it semantically meaningful. RDF annotated patients’ data has made it semantically interoperable. SPARQL query is used to extract records from RDF graph. For simulation of system, we used Tableau, Gruff-6.2.0, and Mysql tools.

  10. Galileo SSI Observations of Io During Orbits C30 I33

    Science.gov (United States)

    Keszthelyi, L.; Turtle, E.; McEwen, A.; Simonelli, D.; Geissler, P.; Williams, D.; Milazzo, M.; Radebaugh, J.; Jaeger, W.; Klaasen, K. P.

    2002-01-01

    New Galileo SSI imaging of Io from orbits C30 I33 will be presented. The aging Galileo spacecraft continues to produce spectacular new results, including the tallest volcanic plume yet found on Io. Additional information is contained in the original extended abstract.

  11. 5G IoT Industry Verticals and Network Requirements

    OpenAIRE

    Condoluci, Massimo; Lema Rosas, Maria Angel; Mahmoodi, Toktam; Dohler, Michael

    2017-01-01

    The effective provisioning of industry verticals over the next-to-come 5G systems opens novel business opportunities for telco operators especially when considering the integration of Internet of Things (IoT) devices as enablers of business cases based on remote sensing and control. This chapter highlights the main features of IoT verticals with particular attention on healthcare, smart cities, industry automation and entertainment business cases. The aim of this Chapter is to derive the requ...

  12. BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide smart services with or without human intervention. While leveraging the large scale IoT based applications like Smart Gird or Smart Cities, IoTs also incur more concerns on privacy and security. Among the top security challenges that IoTs face, access authorization is critical in resource sharing and information protection. One of the weaknesses in today's access control (AC) is ...

  13. Review on open source operating systems for internet of things

    Science.gov (United States)

    Wang, Zhengmin; Li, Wei; Dong, Huiliang

    2017-08-01

    Internet of Things (IoT) is an environment in which everywhere and every device became smart in a smart world. Internet of Things is growing vastly; it is an integrated system of uniquely identifiable communicating devices which exchange information in a connected network to provide extensive services. IoT devices have very limited memory, computational power, and power supply. Traditional operating systems (OS) have no way to meet the needs of IoT systems. In this paper, we thus analyze the challenges of IoT OS and survey applicable open source OSs.

  14. iOS Game Development using SpriteKit Framework with Swift Programming Language

    OpenAIRE

    Gurung, Lal

    2016-01-01

    iOS is a mobile operating system for Apple manufactured phones and tablets. Mobile Gaming Industries are growing very fast, and compatibility with iOS is becoming very popular among game developers. The aim of this Bachelor’s thesis was to find the best available game development tools for iOS platform. The 2D game named Lapland was developed using Apple’s own native framework, SpriteKit. The game was written with the SpriteKit programming language. The combination of SpriteKit and Swift...

  15. IoTFLiP: IoT-based flipped learning platform for medical education

    Directory of Open Access Journals (Sweden)

    Maqbool Ali

    2017-08-01

    Full Text Available Case-Based Learning (CBL has become an effective pedagogy for student-centered learning in medical education, which is founded on persistent patient cases. Flippped learning and Internet of Things (IoTs concepts have gained significant attention in recent years. Using these concepts in conjunction with CBL can improve learning ability by providing real evolutionary medical cases. It also enables students to build confidence in their decision making, and efficiently enhances teamwork in the learing environment. We propose an IoT-based Flip Learning Platform, called IoTFLiP, where an IoT infrastructure is exploited to support flipped case-based learning in a cloud environment with state of the art security and privacy measures for personalized medical data. It also provides support for application delivery in private, public, and hybrid approaches. The proposed platform is an extension of our Interactive Case-Based Flipped Learning Tool (ICBFLT, which has been developed based on current CBL practices. ICBFLT formulates summaries of CBL cases through synergy between students' and medical expert knowledge. The low cost and reduced size of sensor device, support of IoTs, and recent flipped learning advancements can enhance medical students' academic and practical experiences. In order to demonstrate a working scenario for the proposed IoTFLiP platform, real-time data from IoTs gadgets is collected to generate a real-world case for a medical student using ICBFLT.

  16. Benefits of Parallel I/O in Ab Initio Nuclear Physics Calculations

    International Nuclear Information System (INIS)

    Laghave, Nikhil; Sosonkina, Masha; Maris, Pieter; Vary, James P.

    2009-01-01

    Many modern scientific applications rely on highly parallel calculations, which scale to 10's of thousands processors. However, most applications do not concentrate on parallelizing input/output operations. In particular, sequential I/O has been identified as a bottleneck for the highly scalable MFDn (Many Fermion Dynamics for nuclear structure) code performing ab initio nuclear structure calculations. In this paper, we develop interfaces and parallel I/O procedures to use a well-known parallel I/O library in MFDn. As a result, we gain efficient input/output of large datasets along with their portability and ease of use in the downstream processing.

  17. IoT: Their Conveniences, Security Challenges and Possible Solutions

    Directory of Open Access Journals (Sweden)

    Davar Pishva

    2017-07-01

    Full Text Available The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security challenges of these devices are becoming realities in the present day life. The paper initially provides some introductory information about the topic, mostly by means of survey and citations of previous work. It then highlights the devastating effects of October 21, 2016 DDoS attack which mainly utilized IoT devices. It emphasizes the danger of recently revealed Mirai IoT botnet which serves as the basis for the DDoS-for-hire ‘booter’/ ‘stresser’ service. In terms of counter measures, after highlighting IoT security implementation challenges, numerous approaches are presented. As a long-term solution, an architecture wherein security issues are managed through universal home gateway by network operators in a product based fashion is emphasized. The author shows its technical feasibility and demonstrates its partial materialization in proprietary manners. It then explains why and how numerous stake holders are needed to get together for its wide range commercial implementation. Some immediate necessary safeguard actions and intermediate schemes which include soft infrastructures are also presented for the purpose of risk reduction.

  18. ?Healthcare IoT m-GreenCARDIO Remote Cardiac Monitoring System - Concept, Theory of Operation and Implementation

    Directory of Open Access Journals (Sweden)

    ZAGAN, I.

    2017-05-01

    Full Text Available Present day Internet of Things (IoT developers are inspired by the spectacular evolution in the field, and, at the same time, determined to connect an increasingly wider range of 'things', with the lowest power consumption, the wider range of action and interoperability guaranteed with excessive quality. Based on current challenges in the medical and electronic field, the present paper seeks the practical implementation of an efficient, low cost, low-power IoT medical system, yet with a greater memory autonomy. In this context, our main contribution is the implementation of a solution for ECG monitoring based on IoT techniques. This paper presents a qualitative research in the field of healthcare IoT and embedded applications meant to provide an innovative and flexible system meeting the stringent requirements of this area. Without compromising the performance intake and the low power consumption, the designers offer flexible options for connectivity and response time.

  19. Road to Io

    International Nuclear Information System (INIS)

    Chang, T.

    1989-01-01

    The potential study of Io by the Galileo mission is discussed. The mission, which is scheduled for launch from the Space Shuttle in 1989, is expected to fly 20 to 100 times closer to the Galilean moons of Jupiter than the Voyager missions. Topics which the mission hopes to address include volcanism, tidal forces and continental drift on Io, and the torus of charged particles that accompanies Io on its orbit of Jupiter. The Venus-earth-earth gravity assist route of the mission and the NIR mapping spectrometer aboard Galileo are considered

  20. High-Throughput and Low-Latency Network Communication with NetIO

    Science.gov (United States)

    Schumacher, Jörn; Plessl, Christian; Vandelli, Wainer

    2017-10-01

    HPC network technologies like Infiniband, TrueScale or OmniPath provide low- latency and high-throughput communication between hosts, which makes them attractive options for data-acquisition systems in large-scale high-energy physics experiments. Like HPC networks, DAQ networks are local and include a well specified number of systems. Unfortunately traditional network communication APIs for HPC clusters like MPI or PGAS exclusively target the HPC community and are not suited well for DAQ applications. It is possible to build distributed DAQ applications using low-level system APIs like Infiniband Verbs, but it requires a non-negligible effort and expert knowledge. At the same time, message services like ZeroMQ have gained popularity in the HEP community. They make it possible to build distributed applications with a high-level approach and provide good performance. Unfortunately, their usage usually limits developers to TCP/IP- based networks. While it is possible to operate a TCP/IP stack on top of Infiniband and OmniPath, this approach may not be very efficient compared to a direct use of native APIs. NetIO is a simple, novel asynchronous message service that can operate on Ethernet, Infiniband and similar network fabrics. In this paper the design and implementation of NetIO is presented and described, and its use is evaluated in comparison to other approaches. NetIO supports different high-level programming models and typical workloads of HEP applications. The ATLAS FELIX project [1] successfully uses NetIO as its central communication platform. The architecture of NetIO is described in this paper, including the user-level API and the internal data-flow design. The paper includes a performance evaluation of NetIO including throughput and latency measurements. The performance is compared against the state-of-the- art ZeroMQ message service. Performance measurements are performed in a lab environment with Ethernet and FDR Infiniband networks.

  1. Dangoraižio projektavimo ypatumai

    Directory of Open Access Journals (Sweden)

    Robertas Volvačiovas

    2011-06-01

    Full Text Available Santrauka. Straipsnyje išskiriami pagrindiniai dangoraižio įgyvendinimo ir gyvavimo etapai, aptariamas dangoraižio projektavimo etapas, dangoraižio techninio projekto (TP ir darbo projekto (DP sudėtis, išskiriamos pagrindinės dangoraižių problemos, iškylančios projektavimo etape, ir pateikiami sprendimo būdai.Straipsnis lietuvių kalba

  2. On I/O Virtualization Management

    Science.gov (United States)

    Danciu, Vitalian A.; Metzker, Martin G.

    The quick adoption of virtualization technology in general and the advent of the Cloud business model entail new requirements on the structure and the configuration of back-end I/O systems. Several approaches to virtualization of I/O links are being introduced, which aim at implementing a more flexible I/O channel configuration without compromising performance. While previously the management of I/O devices could be limited to basic technical requirments (e.g. the establishment and termination of fixed-point links), the additional flexibility carries in its wake additional management requirements on the representation and control of I/O sub-systems.

  3. Exploiting Efficient Transpacking for One-Sided Communication and MPI-IO

    Science.gov (United States)

    Mir, Faisal Ghias; Träff, Jesper Larsson

    Based on a construction of socalled input-output datatypes that define a mapping between non-consecutive input and output buffers, we outline an efficient method for copying of structured data. We term this operation transpacking, and show how transpacking can be applied for the MPI implementation of one-sided communication and MPI-IO. For one-sided communication via shared-memory, we demonstrate the expected performance improvements by up to a factor of two. For individual MPI-IO, the time to read or write from file dominates the overall time, but even here efficient transpacking can in some scenarios reduce file I/O time considerably. The reported results have been achieved on a single NEC SX-8 vector node.

  4. IoT-based user-driven service modeling environment for a smart space management system.

    Science.gov (United States)

    Choi, Hoan-Suk; Rhee, Woo-Seop

    2014-11-20

    The existing Internet environment has been extended to the Internet of Things (IoT) as an emerging new paradigm. The IoT connects various physical entities. These entities have communication capability and deploy the observed information to various service areas such as building management, energy-saving systems, surveillance services, and smart homes. These services are designed and developed by professional service providers. Moreover, users' needs have become more complicated and personalized with the spread of user-participation services such as social media and blogging. Therefore, some active users want to create their own services to satisfy their needs, but the existing IoT service-creation environment is difficult for the non-technical user because it requires a programming capability to create a service. To solve this problem, we propose the IoT-based user-driven service modeling environment to provide an easy way to create IoT services. Also, the proposed environment deploys the defined service to another user. Through the personalization and customization of the defined service, the value and dissemination of the service is increased. This environment also provides the ontology-based context-information processing that produces and describes the context information for the IoT-based user-driven service.

  5. Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report)

    OpenAIRE

    Hamza, Ayyoob; Ranathunga, Dinesha; Gharakheili, H. Habibi; Roughan, Matthew; Sivaraman, Vijay

    2018-01-01

    IoT devices are increasingly being implicated in cyber-attacks, driving community concern about the risks they pose to critical infrastructure, corporations, and citizens. In order to reduce this risk, the IETF is pushing IoT vendors to develop formal specifications of the intended purpose of their IoT devices, in the form of a Manufacturer Usage Description (MUD), so that their network behavior in any operating environment can be locked down and verified rigorously. This paper aims to assist...

  6. The Role of Physical Layer Security in IoT: A Novel Perspective

    Directory of Open Access Journals (Sweden)

    Tommaso Pecorella

    2016-08-01

    Full Text Available This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard. As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems.

  7. H-infty Control of systems with multiple i/o delays

    NARCIS (Netherlands)

    Agoes Ariffin Moelja, A.A.; Meinsma, Gjerrit; Mirkin, Leonid

    2003-01-01

    In this paper the standard (four-block) H-infty control problem for systems with multiple i/o delays in the feedback loop is studied. The central idea is to see the multiple delay operator as a special series connection of elementary delay operators, called the adobe delay operators. The adobe delay

  8. IOs as Social Sites

    DEFF Research Database (Denmark)

    Park, Susan M.; Vetterlein, Antje

    Norms research has made significant inroads into examining their emergence and influence in international relations, while recognizing international organizations (IOs) as key social sites for norms to be created and/or disseminated. This paper interrogates how IOs as “organizational platforms......” (Finnemore 1996) influence the norm building process. Going beyond state-centric approaches to norm construction, it argues that the process of taking up a norm by an IO does affect the norm’s power. A norm’s strength is determined by the extent to which it is uncontested and taken for granted as appropriate...... the norm building process in this way provides insight into the effect of IOs as social sites in strengthening a norm....

  9. K2 Au(IO3)5 and β-KAu(IO3)4: Polar Materials with Strong SHG Responses Originating from Synergistic Effect of AuO4 and IO3 Units.

    Science.gov (United States)

    Xu, Xiang; Hu, Chun-Li; Li, Bing-Xuan; Mao, Jiang-Gao

    2016-01-26

    Two new polar potassium gold iodates, namely, K2 Au(IO3)5 (Cmc21) and β-KAu(IO3)4 (C2), have been synthesized and structurally characterized. Both compounds feature zero-dimensional polar [Au(IO3)4](-) units composed of an AuO4 square-planar unit coordinated by four IO3(-) ions in a monodentate fashion. In β-KAu(IO3)4, isolated [Au(IO3)4](-) ions are separated by K(+) ions, whereas in K2 Au(IO3)5, isolated [Au(IO3)4](-) ions and non-coordinated IO3(-) units are separated by K(+) ions. Both compounds are thermally stable up to 400 °C and exhibit high transmittance in the NIR region (λ=800-2500 nm) with measured optical band gaps of 2.65 eV for K2 Au(IO3 )5 and 2.75 eV for β-KAu(IO3)4. Powder second-harmonic generation measurements by using λ=2.05 μm laser radiation indicate that K2 Au(IO3)5 and β-KAu(IO3)4 are both phase-matchable materials with strong SHG responses of approximately 1.0 and 1.3 times that of KTiOPO4, respectively. Theoretical calculations based on DFT methods confirm that such strong SHG responses originate from a synergistic effect of the AuO4 and IO3 units. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. Out of core, out of mind: Practical parallel I/O

    Energy Technology Data Exchange (ETDEWEB)

    Womble, D.E.; Greenberg, D.S.; Riesen, R.E.; Wheat, S.R.

    1993-11-01

    Parallel computers are becoming more powerful and more complex in response to the demand for computing power by scientists and engineers. Inevitably, new and more complex I/O systems will be developed for these systems. In particular we believe that the I/O system must provide the programmer with the ability to explcitly manage storage (despite the trend toward complex parallel file systems and caching schemes). One method of doing so is to have a partitioned secondary storage in which each processor owns a logical disk. Along with operating system enhancements which allow overheads such as buffer copying to be avoided and libraries to support optimal remapping of data, this sort of I/O system meets the needs of high performance computing.

  11. Internet of things (IoT) in 5G mobile technologies

    CERN Document Server

    Mastorakis, George; Batalla, Jordi

    2016-01-01

    This book reports on the latest advances in the modeling, analysis and efficient management of information in Internet of Things (IoT) applications in the context of 5G access technologies. It presents cutting-edge applications made possible by the implementation of femtocell networks and millimeter wave communications solutions, examining them from the perspective of the universally and constantly connected IoT. Moreover, it describes novel architectural approaches to the IoT and presents the new framework possibilities offered by 5G mobile networks, including middleware requirements, node-centrality and the location of extensive functionalities at the edge. By providing researchers and professionals with a timely snapshot of emerging mobile communication systems, and highlighting the main pitfalls and potential solutions, the book fills an important gap in the literature and will foster the further developments of 5G hosting IoT devices.

  12. A performance analysis of advanced I/O architectures for PC-based network file servers

    Science.gov (United States)

    Huynh, K. D.; Khoshgoftaar, T. M.

    1994-12-01

    In the personal computing and workstation environments, more and more I/O adapters are becoming complete functional subsystems that are intelligent enough to handle I/O operations on their own without much intervention from the host processor. The IBM Subsystem Control Block (SCB) architecture has been defined to enhance the potential of these intelligent adapters by defining services and conventions that deliver command information and data to and from the adapters. In recent years, a new storage architecture, the Redundant Array of Independent Disks (RAID), has been quickly gaining acceptance in the world of computing. In this paper, we would like to discuss critical system design issues that are important to the performance of a network file server. We then present a performance analysis of the SCB architecture and disk array technology in typical network file server environments based on personal computers (PCs). One of the key issues investigated in this paper is whether a disk array can outperform a group of disks (of same type, same data capacity, and same cost) operating independently, not in parallel as in a disk array.

  13. Linear SVM-Based Android Malware Detection for Reliable IoT Services

    Directory of Open Access Journals (Sweden)

    Hyo-Sik Ham

    2014-01-01

    Full Text Available Current many Internet of Things (IoT services are monitored and controlled through smartphone applications. By combining IoT with smartphones, many convenient IoT services have been provided to users. However, there are adverse underlying effects in such services including invasion of privacy and information leakage. In most cases, mobile devices have become cluttered with important personal user information as various services and contents are provided through them. Accordingly, attackers are expanding the scope of their attacks beyond the existing PC and Internet environment into mobile devices. In this paper, we apply a linear support vector machine (SVM to detect Android malware and compare the malware detection performance of SVM with that of other machine learning classifiers. Through experimental validation, we show that the SVM outperforms other machine learning classifiers.

  14. Information Operations And J-3: A Perfect Union

    National Research Council Canada - National Science Library

    Patschke, Gregory

    2004-01-01

    ... on a lack of unity of command and unity of effort as primary catalysts for this failure. They proposed eliminating the IO cell concept and adopting either an IO task force or a specific IO functional component command. I disagree...

  15. Design and Implementation of Henan Huinong Client System Based on iOS

    Directory of Open Access Journals (Sweden)

    Li Yan-Ling

    2016-01-01

    Full Text Available In order to meet the demands of customers related to agriculture who can obtain some Comprehensive agricultural information service of Henan Province through the intelligent mobile terminal, on the base of the Zhong yuan Rural Information Port integrated platform, employing IOS, Java, Eclipse, XML, SAX technology, we designed and developed Henan Huinong client systems based on ios mobile terminal. This system has achieved the multiple applications, such as agricultural information browsing, network consulting, expert online, crop rermote diagnosis and so on.

  16. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    Science.gov (United States)

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  17. Klasifikace v oblasti IoT

    OpenAIRE

    Flégl, Jaroslav

    2017-01-01

    This bachelor thesis is focused on classification of IoT. The aim of this thesis is classifying and categorizing IoT using systematic literature review. Several steps are needed to fulfill this aim. First part of this thesis focuses on defining IoT. Top ten companies, which invest the most to IoT are introduced with their view on IoT. Then follows characterization of classification and categorization including differences between them. Second part focuses on describing SLR. First of all the p...

  18. An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices

    Directory of Open Access Journals (Sweden)

    Hwankuk Kim

    2018-05-01

    Full Text Available Since 2016, Mirai and Persirai malware have infected hundreds of thousands of Internet of Things (IoT devices and created a massive IoT botnet, which caused distributed denial of service (DDoS attacks. IoT malware targets vulnerable IoT devices, which are vulnerable to security risks. Techniques are needed to prevent IoT devices from being exploited by attackers. However, unlike high-performance PCs, IoT devices are lightweight, low-power, and low-cost, having performance limitations regarding processing and memory, which makes it difficult to install security and anti-malware programs. Recently, several studies have been attempted to quickly search for vulnerable internet-connected devices to solve this real issue. Issues yet to be studied still exist regarding these types of internet-wide scan technologies, such as filtering by security devices and a shortage of collected operating system (OS information. This paper proposes an intelligent internet-wide scan model that improves IP state scanning with advanced internet protocol (IP randomization, reactive protocol (port scanning, and OS fingerprinting scanning, applying k* algorithm in order to find vulnerable IoT devices. Additionally, we describe the experiment’s results compared to the existing internet-wide scan technologies, such as ZMap and Shodan. As a result, the proposed model experimentally shows improved performance. Although we improved the ZMap, the throughput per minute (TPM performance is similar to ZMap without degrading the IP scan throughput and the performance of generating a single IP address is about 118% better than ZMap. In the protocol scan performance experiments, it is about 129% better than the Censys based ZMap, and the performance of OS fingerprinting is better than ZMap, with about 50% accuracy.

  19. A federated capability-based access control mechanism for internet of things (IoTs)

    Science.gov (United States)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  20. Modular HPC I/O characterization with Darshan

    Energy Technology Data Exchange (ETDEWEB)

    Snyder, Shane; Carns, Philip; Harms, Kevin; Ross, Robert; Lockwood, Glenn K.; Wright, Nicholas J.

    2016-11-13

    Contemporary high-performance computing (HPC) applications encompass a broad range of distinct I/O strategies and are often executed on a number of different compute platforms in their lifetime. These large-scale HPC platforms employ increasingly complex I/O subsystems to provide a suitable level of I/O performance to applications. Tuning I/O workloads for such a system is nontrivial, and the results generally are not portable to other HPC systems. I/O profiling tools can help to address this challenge, but most existing tools only instrument specific components within the I/O subsystem that provide a limited perspective on I/O performance. The increasing diversity of scientific applications and computing platforms calls for greater flexibililty and scope in I/O characterization.

  1. Active Volcanic Eruptions on Io

    Science.gov (United States)

    1996-01-01

    Six views of the volcanic plume named Prometheus, as seen against Io's disk and near the bright limb (edge) of the satellite by the SSI camera on the Galileo spacecraft during its second (G2) orbit of Jupiter. North is to the top of each frame. To the south-southeast of Prometheus is another bright spot that appears to be an active plume erupting from a feature named Culann Patera. Prometheus was active 17 years ago during both Voyager flybys, but no activity was detected by Voyager at Culann. Both of these plumes were seen to glow in the dark in an eclipse image acquired by the imaging camera during Galileo's first (G1) orbit, and hot spots at these locations were detected by Galileo's Near-Infrared Mapping Spectrometer.The plumes are thought to be driven by heating sulfur dioxide in Io's subsurface into an expanding fluid or 'geyser'. The long-lived nature of these eruptions requires that a substantial supply of sulfur dioxide must be available in Io's subsurface, similar to groundwater. Sulfur dioxide gas condenses into small particles of 'snow' in the expanding plume, and the small particles scatter light and appear bright at short wavelengths. The images shown here were acquired through the shortest-wavelength filter (violet) of the Galileo camera. Prometheus is about 300 km wide and 75 km high and Culann is about 150 km wide and less than 50 km high. The images were acquired on September 4, 1996 at a range of 2,000,000 km (20 km/pixel resolution). Prometheus is named after the Greek fire god and Culann is named after the Celtic smith god.The Jet Propulsion Laboratory, Pasadena, CA manages the Galileo mission for NASA's Office of Space Science, Washington, DC. JPL is an operating division of California Institute of Technology (Caltech).This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can

  2. A Low-Power WLAN Communication Scheme for IoT WLAN Devices Using Wake-Up Receivers

    Directory of Open Access Journals (Sweden)

    Hanseul Hong

    2018-01-01

    Full Text Available In this paper, we propose a delay- and power-efficient, multi-user, low-power wireless local area network (WLAN communication scheme for Internet of Things (IoT WLAN devices. Extremely low-power operation is one of the key requirements of emerging IoT devices. However, the current duty-cycle-based power saving approach may incur large access delay times owing to the trade-offs between the power consumption and the access delay. In order to reduce this delay and enhance the power-saving performance, wake-up receiver-based schemes have been proposed. However, because wake-up receiver-based schemes do not consider multiuser operation in dense communication environments, large delays are inevitable in the case of multiuser operation. In order to provide extremely low-power operation and under 1-mW standby power with reduced delay, we employed the optimized multiuser transmission scheduling of IEEE 802.11ax in the proposed scheme and proper enhanced distributed channel access (EDCA parameter settings. This is with the aim to reduce the delay caused by long wake-up times, and to avoid collisions caused by simultaneous transmission in uplink multiuser scenario. By using the proposed scheme, simultaneous IoT communication with multiple mobile IoT devices is possible while providing low-power operation. Simulation results verified the outstanding delay performance of the proposed scheme.

  3. SSTL I/O Standard Based Environment Friendly Energy Efficient ROM Design on FPGA

    DEFF Research Database (Denmark)

    Bansal, Neha; Bansal, Meenakshi; Saini, Rishita

    2014-01-01

    are operating ROM with the highest operating frequency of 4th generation i7 processor to test the compatibility of this design with the latest hardware in use. When there is no demand of peak performance, then we can save 74.5% clock power, 75% signal power, and 30.83% I/O power by operating our device with 1......Stub Series Terminated Logic (SSTL) is an Input/output standard. It is used to match the impedance of line, port and device of our design under consideration. Therefore, selection of energy efficient SSTL I/O standard among available different class of SSTL logic family in FPGA, plays a vital role...

  4. HUBBLE CLICKS IMAGES OF IO SWEEPING ACROSS JUPITER

    Science.gov (United States)

    2002-01-01

    are regions of sulfur dioxide frost. On Jupiter, the white and brown regions distinguish areas of high-altitude haze and clouds; the blue regions depict relatively clear skies at high altitudes. These images were taken July 22, 1997, in two wavelengths: 3400 Angstroms (ultraviolet) and 4100 Angstroms (violet). The colors do not correspond closely to what the human eye would see because ultraviolet light is invisible to the eye. Io: Jupiter's Volcanic Moon In the close-up picture of Io (bottom right), the mound rising from Io's surface is actually an eruption from Pillan, a volcano that had previously been dormant. Measurements at two ultraviolet wavelengths indicate that the ejecta consist of sulfur dioxide 'snow,' making the plume appear green in this false-color image. Astronomers increased the color contrast and added false colors to the image to make the faint plume visible. Pillan's plume is very hot and its ejecta is moving extremely fast. Based on information from the Galileo spacecraft, Pillan's outburst is at least 2,240 degrees Fahrenheit (1,500 degrees Kelvin). The late bloomer is spewing material at speeds of 1,800 mph (2,880 kilometers per hour). The hot sulfur dioxide gas expelled from the volcano cools rapidly as it expands into space, freezing into snow. Io is well known for its active volcanoes, many of which blast huge plumes of volcanic debris into space. Astronomers discovered Pillan's volcanic explosion while looking for similar activity from a known active volcano, Pele, about 300 miles (500 kilometers) away from Pillan. But Pele turned out to be peaceful. Io has hundreds of active volcanoes, but only a few, typically eight or nine, have visible plumes at any given time. Scientists will get a closer look at Io later this year during a pair of close flybys to be performed by NASA's Galileo spacecraft, which has been orbiting Jupiter and its moons for nearly 3-1/2 years. The first Galileo flyby is scheduled for Oct. 10 at an altitude of 379 miles

  5. Cassini-VIMS at Jupiter: Solar occultation measurements using Io

    Science.gov (United States)

    Formisano, V.; D'Aversa, E.; Bellucci, G.; Baines, K.H.; Bibring, J.-P.; Brown, R.H.; Buratti, B.J.; Capaccioni, F.; Cerroni, P.; Clark, R.N.; Coradini, A.; Cruikshank, D.P.; Drossart, P.; Jaumann, R.; Langevin, Y.; Matson, D.L.; McCord, T.B.; Mennella, V.; Nelson, R.M.; Nicholson, P.D.; Sicardy, B.; Sotin, Christophe; Chamberlain, M.C.; Hansen, G.; Hibbits, K.; Showalter, M.; Filacchione, G.

    2003-01-01

    We report unusual and somewhat unexpected observations of the jovian satellite Io, showing strong methane absorption bands. These observations were made by the Cassini VIMS experiment during the Jupiter flyby of December/January 2000/2001. The explanation is straightforward: Entering or exiting from Jupiter's shadow during an eclipse, Io is illuminated by solar light which has transited the atmosphere of Jupiter. This light, therefore becomes imprinted with the spectral signature of Jupiter's upper atmosphere, which includes strong atmospheric methane absorption bands. Intercepting solar light refracted by the jovian atmosphere, Io essentially becomes a "miffor" for solar occultation events of Jupiter. The thickness of the layer where refracted solar light is observed is so large (more than 3000 km at Io's orbit), that we can foresee a nearly continuous multi-year period of similar events at Saturn, utilizing the large and bright ring system. During Cassini's 4-year nominal mission, this probing tecnique should reveal information of Saturn's atmosphere over a large range of southern latitudes and times. ?? 2003 Elsevier Inc. All rights reserved.

  6. Erosional scarps on Io

    International Nuclear Information System (INIS)

    McCauley, J.F.; Soderblom, L.A.; Smith, B.A.

    1979-01-01

    Irregular or fretted scarps on Io as revealed during the voyager 1 mission are similar to those found on Earth and Mars. A sapping mechanism involving liquid SO 2 is proposed to explain these complexly eroded terrains on Io. (author)

  7. EVIO - A lightweight object-oriented I/O package

    International Nuclear Information System (INIS)

    Wolin, E.; Abbott, D.; Gurjyan, V.; Heyes, G.; Jastrzembski, E.; Lawrence, D.; Timmer, C.

    2008-01-01

    The EVIO package implements I/O between disk and an in-memory hierarchical object tree. Tree nodes are either container nodes, holding other nodes, or leaf nodes, containing any amount of data of a single type (int64 t ,..., int8 t , float, double, and string). Trees can easily be constructed using factory methods and stream operators; queried using STL-like algorithms, function object, etc; or modified using tree or node methods. The tree logically maps to XML, and utilities exist to transform between binary and ASCII XML formats. The binary representation is compact, I/O is simple and efficient, and endian conversions are handled automatically. EVIO will be used by the next generation of experiments at Jefferson Lab.

  8. Performance Analysis of Video PHY Controller Using Unidirection and Bi-directional IO Standard via 7 Series FPGA

    DEFF Research Database (Denmark)

    Das, Bhagwan; Abdullah, M F L; Hussain, Dil muhammed Akbar

    2017-01-01

    graphics consumes more power, this creates a need of designing the low power design for Video PHY controller. In this paper, the performance of Video PHY controller is analyzed by comparing the power consumption of unidirectional and bi-directional IO Standard over 7 series FPGA. It is determined...... that total on-chip power is reduced for unidirectional IO Standard based Video PHY controller compared to bidirectional IO Standard based Video PHY controller. The most significant achievement of this work is that it is concluded that unidirectional IO Standard based Video PHY controller consume least...... standby power compared to bidirectional IO Standard based Video PHY controller. It is defined that for 6 GHz operated frequency Video PHY controller, the 32% total on-chip power is reduced using unidirectional IO Standard based Video PHY controller is less compared to bidirectional IO Standard based Video...

  9. A Resource Service Model in the Industrial IoT System Based on Transparent Computing.

    Science.gov (United States)

    Li, Weimin; Wang, Bin; Sheng, Jinfang; Dong, Ke; Li, Zitong; Hu, Yixiang

    2018-03-26

    The Internet of Things (IoT) has received a lot of attention, especially in industrial scenarios. One of the typical applications is the intelligent mine, which actually constructs the Six-Hedge underground systems with IoT platforms. Based on a case study of the Six Systems in the underground metal mine, this paper summarizes the main challenges of industrial IoT from the aspects of heterogeneity in devices and resources, security, reliability, deployment and maintenance costs. Then, a novel resource service model for the industrial IoT applications based on Transparent Computing (TC) is presented, which supports centralized management of all resources including operating system (OS), programs and data on the server-side for the IoT devices, thus offering an effective, reliable, secure and cross-OS IoT service and reducing the costs of IoT system deployment and maintenance. The model has five layers: sensing layer, aggregation layer, network layer, service and storage layer and interface and management layer. We also present a detailed analysis on the system architecture and key technologies of the model. Finally, the efficiency of the model is shown by an experiment prototype system.

  10. Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT

    Directory of Open Access Journals (Sweden)

    Hongyang Yan

    2018-06-01

    Full Text Available In recent years, the Internet of Things (IoT has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to cloud computing. To further reduce the communication bandwidth and storage space, data deduplication has been widely adopted to eliminate the redundant data. However, since data collected in IoT are sensitive and closely related to users’ personal information, the privacy protection of users’ information becomes a challenge. As the channels, like the wireless channels between the terminals and the cloud servers in IoT, are public and the cloud servers are not fully trusted, data have to be encrypted before being uploaded to the cloud. However, encryption makes the performance of deduplication by the cloud server difficult because the ciphertext will be different even if the underlying plaintext is identical. In this paper, we build a centralized privacy-preserving duplicate removal storage system, which supports both file-level and block-level deduplication. In order to avoid the leakage of statistical information of data, Intel Software Guard Extensions (SGX technology is utilized to protect the deduplication process on the cloud server. The results of the experimental analysis demonstrate that the new scheme can significantly improve the deduplication efficiency and enhance the security. It is envisioned that the duplicated removal system with privacy preservation will be of great use in the centralized storage environment of IoT.

  11. Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT.

    Science.gov (United States)

    Yan, Hongyang; Li, Xuan; Wang, Yu; Jia, Chunfu

    2018-06-04

    In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to cloud computing. To further reduce the communication bandwidth and storage space, data deduplication has been widely adopted to eliminate the redundant data. However, since data collected in IoT are sensitive and closely related to users' personal information, the privacy protection of users' information becomes a challenge. As the channels, like the wireless channels between the terminals and the cloud servers in IoT, are public and the cloud servers are not fully trusted, data have to be encrypted before being uploaded to the cloud. However, encryption makes the performance of deduplication by the cloud server difficult because the ciphertext will be different even if the underlying plaintext is identical. In this paper, we build a centralized privacy-preserving duplicate removal storage system, which supports both file-level and block-level deduplication. In order to avoid the leakage of statistical information of data, Intel Software Guard Extensions (SGX) technology is utilized to protect the deduplication process on the cloud server. The results of the experimental analysis demonstrate that the new scheme can significantly improve the deduplication efficiency and enhance the security. It is envisioned that the duplicated removal system with privacy preservation will be of great use in the centralized storage environment of IoT.

  12. Seeking opportunities in the Internet of Things (IoT): : A Study of IT values co-creation in the IoT ecosystem while considering the potential impacts of the EU General Data Protection Regulations (GDPR).

    OpenAIRE

    Ford, David Thomas; Qamar, Sreman

    2017-01-01

    In this thesis, we have studied the phenomena of value co-creation in IoT ecosystem, while considering the potential impacts of GDPR on IT value co-creation in the IoT ecosystem. IT firms’ ability to create value is an important aspect of their existence and growth in which case they pursuit different and several means to accomplish this task. IT firms that operate within the IoT ecosystem are categorised as Enablers, Engagers, and Enhancers who interact, work together to provide the technolo...

  13. Flujo de control en iOS Flow control in iOS

    Directory of Open Access Journals (Sweden)

    Franklin Hernández Castro

    2012-11-01

    Full Text Available El objetivo de este artículo es explicar los flujos de control que se usan en la programación de las aplicaciones en iOS, con el fin de resumir los aspectos más relevantes que se deben tomar en cuenta para programar una tarea a ser realizada por un dispositivo móvil del tipo iPhone o iPad. Debido a que el ambiente iOS es estrictamente orientado a objetos (OOP, los flujos de control no son obvios; además, los estándares de la firma Apple® definen patrones de diseño en el sistema que son altamente recomendados en este tipo de diseño. En este artículo se introducen algunos de ellos.This paper explain the control flows that are used by programming applications in iOS, trying to summarize the most important aspects to be considered by programming mobile devices like iPhone and iPad. Because iOS environment, is strictly a object-oriented one(OOP, control flows are not obvious, besides Apple® use design patterns highly recommended in this type of programming. Here we introduces some of them.

  14. A Dynamic Processing System for Sensor Data in IoT

    OpenAIRE

    Li, Minbo; Liu, Yanling; Cai, Yuanfeng

    2015-01-01

    With the development of the Internet of Things (IoT for short), innumerable Wireless Sensor Networks (WSNs) are deployed to capture the information of environmental status in the surrounding physical environment. The data from WSNs, called sensor data, are generated in high frequency. Similar to data of other open-loop applications, for example, network monitoring data, sensor data are heterogeneous, redundant, real-time, massive, and streaming. Hence, sensor data cannot be treated as the IoT...

  15. Galileo's Last Fly-Bys of Io: NIMS Observations of Loki, Tupan, and Emakong Calderas

    Science.gov (United States)

    Lopes, Rosaly M. C.; Kamp, L. W.; Davies, A. G.; Smythe, W. D.; Carlson, R. W.; Doute, S.; McEwen, A.; Turtle, E. P.; Leader, F.; Mehlman, R.

    2002-01-01

    NIMS results from the 2001 Galileo fly-bys of Io will be presented, focusing on three calderas that may contain lava lakes. Preliminary results from the January 2002 Io fly-by will be presented. Additional information is contained in the original extended abstract.

  16. Distributed service-based approach for sensor data fusion in IoT environments.

    Science.gov (United States)

    Rodríguez-Valenzuela, Sandra; Holgado-Terriza, Juan A; Gutiérrez-Guerrero, José M; Muros-Cobos, Jesús L

    2014-10-15

    The Internet of Things (IoT) enables the communication among smart objects promoting the pervasive presence around us of a variety of things or objects that are able to interact and cooperate jointly to reach common goals. IoT objects can obtain data from their context, such as the home, office, industry or body. These data can be combined to obtain new and more complex information applying data fusion processes. However, to apply data fusion algorithms in IoT environments, the full system must deal with distributed nodes, decentralized communication and support scalability and nodes dynamicity, among others restrictions. In this paper, a novel method to manage data acquisition and fusion based on a distributed service composition model is presented, improving the data treatment in IoT pervasive environments.

  17. IoT-Based Library Automation and Monitoring system: Developing an Implementation framework of Implementation

    OpenAIRE

    Bayani, Majid; Segura, Alberto; Alvarado, Marjorie; Loaiza, Mayra

    2018-01-01

    Currently, the Information and Communication Technology (ICT) and related topics such as Internet of Things (IoT) have an essential influence on all elements of human life. IoT as a prevalent phenomenon is transforming daily life by the usage of the smart features of Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) technologies. As IoT progresses, it has extended in size and dimension, improving many contexts of the society; such as, the traditional library system. This...

  18. Intra-operative 3-T MRI for paediatric brain tumours: challenges and perspectives

    International Nuclear Information System (INIS)

    Abernethy, L.J.; Avula, S.; Hughes, G.M.; Wright, E.J.; Mallucci, C.L.

    2012-01-01

    MRI is the ideal modality for imaging intracranial tumours. Intraoperative MRI (ioMRI) makes it possible to obtain scans during a neurosurgical operation that can aid complete macroscopic tumour resection - a major prognostic factor in the majority of brain tumours in children. Intra-operative MRI can also help limit damage to normal brain tissue. It therefore has the potential to improve the survival of children with brain tumours and to minimise morbidity, including neurological deficits. The use of ioMRI is also likely to reduce the need for second look surgery, and may reduce the need for chemotherapy and radiotherapy. High-field MRI systems provide better anatomical information and also enable effective utilisation of advanced MRI techniques such as perfusion imaging, diffusion tensor imaging, and magnetic resonance spectroscopy. However, high-field ioMRI facilities require substantial capital investment, and careful planning is required for optimal benefit. Safe ioMRI requires meticulous attention to detail and rigorous application of magnetic field safety precautions. Interpretation of ioMRI can be challenging and requires experience and understanding of artefacts that are common in the intra-operative setting. (orig.)

  19. A Model of Socially Connected Web Objects for IoT Applications

    Directory of Open Access Journals (Sweden)

    Sajjad Ali

    2018-01-01

    Full Text Available The Internet of Things (IoT is evolving with the connected objects at an unprecedented rate, bringing about enormous opportunities for the future IoT applications as well as challenges. One of the major challenges is to handle the complexity generated by the interconnection of billions of objects. However, Social Internet of Things (SIoT, emerging from the conglomeration of IoT and social networks, has realized an efficient way to facilitate the development of complex future IoT applications. Nevertheless, to fully utilize the benefits of SIoT, a platform that can provide efficient services using social relations among heterogeneous objects is highly required. The web objects enabled IoT environment promotes SIoT features by enabling virtualization using virtual objects and supporting the modularity with microservices. To realize SIoT services, this article proposes an architecture that provides a foundation for the development of lightweight microservices based on socially connected web objects. To efficiently discover web objects and reduce the complexity of service provisioning processes, a social relationship model is presented. To realize the interoperable service operations, a semantic ontology model has been developed. Finally, to evaluate the proposed design, a prototype has been implemented based on a use case scenario.

  20. Volcanic features of Io

    International Nuclear Information System (INIS)

    Carr, M.H.; Masursky, H.; Strom, R.G.; Terrile, R.J.

    1979-01-01

    The volcanic features of Io as detected during the Voyager mission are discussed. The volcanic activity is apparently higher than on any other body in the Solar System. Its volcanic landforms are compared with features on Earth to indicate the type of volcanism present on Io. (U.K.)

  1. Using a layered model to place EW in context within the information sphere

    CSIR Research Space (South Africa)

    Maasdorp, FDV

    2012-11-01

    Full Text Available In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper...

  2. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities

    Directory of Open Access Journals (Sweden)

    Jorge Lanza

    2016-06-01

    Full Text Available The Internet-of-Things (IoT is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  3. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities.

    Science.gov (United States)

    Lanza, Jorge; Sanchez, Luis; Gomez, David; Elsaleh, Tarek; Steinke, Ronald; Cirillo, Flavio

    2016-06-29

    The Internet-of-Things (IoT) is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo) boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  4. iOS 6 foundations

    CERN Document Server

    Feiler, Jesse

    2013-01-01

    A practical introduction for using iOS 6 to create universal apps If you have prior experience programming in an object-oriented language and are eager to start building universal apps for iPad and iPhone (including the iPod touch), then this is the book for you! Using the latest version of iOS (iOS 6) along with the latest version of Xcode (Xcode 4.5), this book is a practical introduction rather than just a catalog of components. Full-color and packed with groundbreaking, innovative designs, this book teaches you how to create eye-catching, unique apps. Teaches you the va

  5. Volcanic eruption plumes on Io

    International Nuclear Information System (INIS)

    Strom, R.G.; Terrile, R.J.; Masursky, H.; Hansen, C.

    1979-01-01

    The detection of an umbrella-shaped plume extending about 280 km above the bright limb of Io was one of the most important discoveries made during the Voyager 1 encounter with the jovian system. This discovery proves that Io is volcanically active at present, and the number and magnitude of these eruptions indicate that Io is the most volcanically active body so far discovered in the Solar System. Preliminary analyses of these eruptive plumes are presented. (U.K.)

  6. Ranking System for IoT Industry Platform

    OpenAIRE

    Mukherjee, Somshree

    2016-01-01

    The Internet of Things (IoT) has seen a huge growth spurt in the last few years which has resulted in the need for more standardised IoT technology. Because of this, numerous IoT platforms have sprung up that offer a variety of features and use different technologies which may not necessarily be compliant with each other or with other technologies. Companies that wish to enter theIoT market are in constant need to find the most suitable IoT platform for their business and have a certain set o...

  7. Reproducibility and Variability of I/O Performance on BG/Q: Lessons Learned from a Data Aggregation Algorithm

    Energy Technology Data Exchange (ETDEWEB)

    Tessier, Francois [Argonne National Lab. (ANL), Argonne, IL (United States); Vishwanath, Venkatram [Argonne National Lab. (ANL), Argonne, IL (United States)

    2017-11-28

    Reading and writing data efficiently from different tiers of storage is necessary for most scientific simulations to achieve good performance at scale. Many software solutions have been developed to decrease the I/O bottleneck. One wellknown strategy, in the context of collective I/O operations, is the two-phase I/O scheme. This strategy consists of selecting a subset of processes to aggregate contiguous pieces of data before performing reads/writes. In our previous work, we implemented the two-phase I/O scheme with a MPI-based topology-aware algorithm. Our algorithm showed very good performance at scale compared to the standard I/O libraries such as POSIX I/O and MPI I/O. However, the algorithm had several limitations hindering a satisfying reproducibility of our experiments. In this paper, we extend our work by 1) identifying the obstacles we face to reproduce our experiments and 2) discovering solutions that reduce the unpredictability of our results.

  8. uFlip: Understanding Flash IO Patterns

    DEFF Research Database (Denmark)

    Bouganim, Luc; Jonsson, Bjørn; Bonnet, Philippe

    2009-01-01

    want to establish what kind of IOs should be favored (or avoided) when designing algorithms and architectures for flash-based systems. In this paper, we focus on flash IO patterns, that capture relevant distribution of IOs in time and space, and our goal is to quantify their performance. We define uFLIP...

  9. IoT Platforms: Analysis for Building Projects

    Directory of Open Access Journals (Sweden)

    Rusu Liviu DUMITRU

    2017-01-01

    Full Text Available This paper presents a general survey of IoT platforms in terms of features for IoT project de-velopers. I will briefly summarize the state of knowledge in terms of technology regarding “In-ternet of Things” first steps in developing this technology, history, trends, sensors and micro-controllers used. I have evaluated a number of 5 IoT platforms in terms of the features needed to develop a IoT project. I have listed those components that are most appreciated by IoT pro-ject developers and the results have been highlighted in a comparative analysis of these plat-forms from the point of view of IoT project developers and which are strictly necessary as a de-velopment environment for an IoT project based. I’ve also considered the users' views of such platforms in terms of functionality, advantages, disadvantages and dangers presented by this technology.

  10. I/O in the ATLAS multithreaded framework

    CERN Document Server

    Cranshaw, Jack; The ATLAS collaboration; Nowak, Marcin

    2018-01-01

    Scalable multithreading poses challenges to I/O, and the performance of a thread-safe I/O strategy may depend upon many factors, including I/O latencies, whether tasks are CPU- or I/O-intensive, and thread count. In a multithreaded framework, an I/O infrastructure must efficiently supply event data to and collect it from many threads processing multiple events in flight. In particular, on-demand reading from multiple threads may challenge caching strategies that were developed for serial processing and may need to be enhanced. This I/O infrastructure must also address how to read, make available, and propagate in-file metadata and other non-event data needed as context for event processing. We describe the design and scheduling of I/O components in the ATLAS multithreaded control framework, AthenaMT, for both event and non-event I/O. We discuss issues associated with exploiting the multithreading capabilities of our underlying persistence technology, ROOT, in a manner harmonious with the ATLAS framework’s o...

  11. A survey of IoT cloud platforms

    Directory of Open Access Journals (Sweden)

    Partha Pratim Ray

    2016-12-01

    Full Text Available Internet of Things (IoT envisages overall merging of several “things” while utilizing internet as the backbone of the communication system to establish a smart interaction between people and surrounding objects. Cloud, being the crucial component of IoT, provides valuable application specific services in many application domains. A number of IoT cloud providers are currently emerging into the market to leverage suitable and specific IoT based services. In spite of huge possible involvement of these IoT clouds, no standard cum comparative analytical study has been found across the literature databases. This article surveys popular IoT cloud platforms in light of solving several service domains such as application development, device management, system management, heterogeneity management, data management, tools for analysis, deployment, monitoring, visualization, and research. A comparison is presented for overall dissemination of IoT clouds according to their applicability. Further, few challenges are also described that the researchers should take on in near future. Ultimately, the goal of this article is to provide detailed knowledge about the existing IoT cloud service providers and their pros and cons in concrete form.

  12. Application of IoT concept on predictive maintenance of industrial equipment

    Directory of Open Access Journals (Sweden)

    Parpala Radu Constantin

    2017-01-01

    Full Text Available The Internet of Things (IoT concept describes an intelligent connectivity of smart devices using the internet network. Nowadays, companies try different approaches for predictive maintenance as a solution to reduce costs and the frequency of maintenance activities. The IoT platforms provide a good support for predictive maintenance as it can integrate information from different machines and manufacturing systems. The main drawback in integrating production system with IoT dedicated platforms is the communication framework, knowing that the main industrial communication protocols are incompatible with modern communication protocols implemented on IoT platforms. In this context, the present paper proposes a new and simple method for on-line monitoring and predictive maintenance of industrial equipment. This method has two features of connected manufacturing. One of these is process monitoring for constant quality assurance, the other one is condition monitoring in order to prevent unplanned downtimes. A case study is presented to demonstrate the feasibility of the proposed method.

  13. From BPM to IoT

    OpenAIRE

    Cherrier , Sylvain; Deshpande , Varun

    2017-01-01

    International audience; IoT’s presence is increasingly felt. There are already more connected devices to the internet than total human population and sales are starting to rise. As there is extensive research ongoing in order to propose a global architecture to build IoT applications, the domain will rise as soon as a common solution will be widespread. Further, we would need to integrate IoT applications into the legacy data processing solutions. Business Process Model, for example, is a com...

  14. Visualization and parallel I/O at extreme scale

    International Nuclear Information System (INIS)

    Ross, R B; Peterka, T; Shen, H-W; Hong, Y; Ma, K-L; Yu, H; Moreland, K

    2008-01-01

    In our efforts to solve ever more challenging problems through computational techniques, the scale of our compute systems continues to grow. As we approach petascale, it becomes increasingly important that all the resources in the system be used as efficiently as possible, not just the floating-point units. Because of hardware, software, and usability challenges, storage resources are often one of the most poorly used and performing components of today's compute systems. This situation can be especially true in the case of the analysis phases of scientific workflows. In this paper we discuss the impact of large-scale data on visual analysis operations and examine a collection of approaches to I/O in the visual analysis process. First we examine the performance of volume rendering on a leadership-computing platform and assess the relative cost of I/O, rendering, and compositing operations. Next we analyze the performance implications of eliminating preprocessing from this example workflow. Then we describe a technique that uses data reorganization to improve access times for data-intensive volume rendering

  15. Landform Degradation and Slope Processes on Io: The Galileo View

    Science.gov (United States)

    Moore, Jeffrey M.; Sullivan, Robert J.; Chuang, Frank C.; Head, James W., III; McEwen, Alfred S.; Milazzo, Moses P.; Nixon, Brian E.; Pappalardo, Robert T.; Schenk, Paul M.; Turtle, Elizabeth P.; hide

    2001-01-01

    The Galileo mission has revealed remarkable evidence of mass movement and landform degradation on Io. We recognize four major slope types observed on a number of intermediate resolution (250 m/pixel) images and several additional textures on very high resolution (10 m/pixel) images. Slopes and scarps on Io often show evidence of erosion, seen in the simplest form as alcove-carving slumps and slides at all scales. Many of the mass movement deposits on Io are probably mostly the consequence of block release and brittle slope failure. Sputtering plays no significant role. Sapping as envisioned by McCauley et al. remains viable. We speculate that alcove-lined canyons seen in one observation and lobed deposits seen along the bases of scarps in several locations may reflect the plastic deformation and 'glacial' flow of interstitial volatiles (e.g., SO2) heated by locally high geothermal energy to mobilize the volatile. The appearance of some slopes and near-slope surface textures seen in very high resolution images is consistent with erosion from sublimation-degradation. However, a suitable volatile (e.g., H2S) that can sublimate fast enough to alter Io's youthful surface has not been identified. Disaggregation from chemical decomposition of solid S2O and other polysulfur oxides may conceivably operate on Io. This mechanism could degrade landforms in a manner that resembles degradation from sublimation, and at a rate that can compete with resurfacing.

  16. VisIO: enabling interactive visualization of ultra-scale, time-series data via high-bandwidth distributed I/O systems

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Christopher J [Los Alamos National Laboratory; Ahrens, James P [Los Alamos National Laboratory; Wang, Jun [UCF

    2010-10-15

    Petascale simulations compute at resolutions ranging into billions of cells and write terabytes of data for visualization and analysis. Interactive visuaUzation of this time series is a desired step before starting a new run. The I/O subsystem and associated network often are a significant impediment to interactive visualization of time-varying data; as they are not configured or provisioned to provide necessary I/O read rates. In this paper, we propose a new I/O library for visualization applications: VisIO. Visualization applications commonly use N-to-N reads within their parallel enabled readers which provides an incentive for a shared-nothing approach to I/O, similar to other data-intensive approaches such as Hadoop. However, unlike other data-intensive applications, visualization requires: (1) interactive performance for large data volumes, (2) compatibility with MPI and POSIX file system semantics for compatibility with existing infrastructure, and (3) use of existing file formats and their stipulated data partitioning rules. VisIO, provides a mechanism for using a non-POSIX distributed file system to provide linear scaling of 110 bandwidth. In addition, we introduce a novel scheduling algorithm that helps to co-locate visualization processes on nodes with the requested data. Testing using VisIO integrated into Para View was conducted using the Hadoop Distributed File System (HDFS) on TACC's Longhorn cluster. A representative dataset, VPIC, across 128 nodes showed a 64.4% read performance improvement compared to the provided Lustre installation. Also tested, was a dataset representing a global ocean salinity simulation that showed a 51.4% improvement in read performance over Lustre when using our VisIO system. VisIO, provides powerful high-performance I/O services to visualization applications, allowing for interactive performance with ultra-scale, time-series data.

  17. Interaction between users and IoT clusters

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2015-01-01

    The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together this will e......The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together...... this will enable the vision of an "Internet of People, Things and Services" (IoPTS). Application areas for IoT include smart cities, smart homes, environmental control, security & emergency, retail, logistics, industrial control, smart farming, and e-Health. All the IoT objects are organized in clusters, which...... framework that is needed to realize IoPTS. In particular, we focus on the interaction between the users and the IoT clusters, where the user profile (role, privileges, and preferences) should be matched with the services offered by the IoT cluster, including the initial set-up, access control...

  18. RapidIO as a multi-purpose interconnect

    Science.gov (United States)

    Baymani, Simaolhoda; Alexopoulos, Konstantinos; Valat, Sébastien

    2017-10-01

    RapidIO (http://rapidio.org/) technology is a packet-switched high-performance fabric, which has been under active development since 1997. Originally meant to be a front side bus, it developed into a system level interconnect which is today used in all 4G/LTE base stations world wide. RapidIO is often used in embedded systems that require high reliability, low latency and scalability in a heterogeneous environment - features that are highly interesting for several use cases, such as data analytics and data acquisition (DAQ) networks. We will present the results of evaluating RapidIO in a data analytics environment, from setup to benchmark. Specifically, we will share the experience of running ROOT and Hadoop on top of RapidIO. To demonstrate the multi-purpose characteristics of RapidIO, we will also present the results of investigating RapidIO as a technology for high-speed DAQ networks using a generic multi-protocol event-building emulation tool. In addition we will present lessons learned from implementing native ports of CERN applications to RapidIO.

  19. Students versus IoT Security

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    What happens when you introduce students to IoT security for the first time? In this talk I will tell you about my first experience with IoT Security and the thought process behind the decisions I made.

  20. Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    Directory of Open Access Journals (Sweden)

    Schulte Christopher

    2011-12-01

    Full Text Available Hoog, A., & Strzempka, K. (2011. iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota (cschulte@lucidatainc.comThese are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers continue to bring new and sometimes hair-pulling challenges into our labs and on-site engagements, research and understanding of these tiny computers is increasing at what seems an exponential rate. This is especially true in the iOS (Apple Computer’s mobile operating system that powers the iPhone, iPad, iPod Touch and Apple TV space. The diligent work of talented computer scientists in this field allows examiners everywhere to reap the benefits of easier, faster and more effective examinations that yield more accurate and defendable results.(see PDF for full review

  1. Understanding IoT systems: a life cycle approach

    NARCIS (Netherlands)

    Rahman, Leila Fatmasari; Ozcelebi, Tanir; Lukkien, Johan

    2018-01-01

    Internet of Things (IoT) systems and the corresponding network architectures are complex due to distributed services on many IoT devices collaboratively fulfilling common goals of IoT applications. System requirements for different types of IoT application domains are still not well-established. The

  2. Aplikasi Rekomendasi Pola Makan Berbasis iOS

    Directory of Open Access Journals (Sweden)

    Afan Galih Salman

    2012-12-01

    Full Text Available The goal for implementing this system is to help users manage and track history about their eat pattern, choose proper food for body’s need, and pick restaurants. Methodology used for this research contains three parts, which is analysis, design, and literature study. In requirement analysis, we do some interview withnutritionist and food provider, analysis iOS user, compare with same kind of application, and identify components that we need. In design method, we use Unified Modelling Language approach, ERD design, and user interface design. The result is a food planning mobile application with iOS platform. This application canhelp user manage and track their eat pattern, help user choose balanced food that suitable for their body, and inform user where they can get food they plan to eat.

  3. Towards multi-layer interoperability of heterogeneous IoT platforms : the INTER-IoT approach

    NARCIS (Netherlands)

    Fortino, Giancarlo; Savaglio, Claudio; Palau, Carlos E.; de Puga, Jara Suarez; Ghanza, Maria; Paprzycki, Marcin; Montesinos, Miguel; Liotta, Antonio; Llop, Miguel; Gravina, R.; Palau, C.E.; Manso, M.; Liotta, A.; Fortino, G.

    2018-01-01

    Open interoperability delivers on the promise of enabling vendors and developers to interact and interoperate, without interfering with anyone’s ability to compete by delivering a superior product and experience. In the absence of global IoT standards, the INTER-IoT voluntary approach will support

  4. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  5. Juno-UVS observation of the Io footprint: Influence of Io's local environment and passage into eclipse on the strength of the interaction

    Science.gov (United States)

    Hue, V.; Gladstone, R.; Greathouse, T. K.; Versteeg, M.; Bonfond, B.; Saur, J.; Davis, M. W.; Roth, L.; Grodent, D. C.; Gerard, J. C. M. C.; Kammer, J.; Bolton, S. J.; Levin, S.; Connerney, J. E. P.

    2017-12-01

    The Juno mission offers an unprecedented opportunity to study Jupiter, from its internal structure to its magnetospheric environment. Juno-UVS is a UV spectrograph with a bandpass of 70vantage point above the poles. In particular, UVS has observed the instantaneous Io footprint and extended tail as Io enters into eclipse. This observation may better constrain whether the atmosphere of Io is sustained via volcanic activity or sublimation. Among other processes, the modulation of Io's footprint brightness correlates to the strength of the interaction between the Io plasma torus and its ionosphere, which, in turn, is likely to be affected by the atmospheric collapse. UVS observed the Io footprint during two eclipses that occurred on PJ1 and PJ3, and one additional eclipse observation is planned during PJ9 (24 Oct. 2017). We present how the electrodynamic coupling between Io and Jupiter is influenced by changes in Io's local environment, e.g. Io's passage in and out of eclipse and Io's traverse of the magnetodisc plasma sheet.

  6. IoT E-business applications

    OpenAIRE

    Radu BUCEA-MANEA-TONIS; Rocsana B. Manea Tonis

    2017-01-01

    “Internet of things” (IoT) will develop soon an ecosystem of internet-connected things, that facilitate the mobile commerce experiences and the client need to be informed all the time. It will be associated with a feeling of freedom and capacity of doing very easy what was considered difficult in the past. Nevertheless, these opportunities will not be capitalized upon without overcoming a series of obstacles, including addressing consumer privacy concerns, the long replacement cycles of du...

  7. Users of the main smartphone operating systems (iOS, Android) differ only little in personality.

    Science.gov (United States)

    Götz, Friedrich M; Stieger, Stefan; Reips, Ulf-Dietrich

    2017-01-01

    The increasingly widespread use of mobile phone applications (apps) as research tools and cost-effective means of vast data collection raises new methodological challenges. In recent years, it has become a common practice for scientists to design apps that run only on a single operating system, thereby excluding large numbers of users who use a different operating system. However, empirical evidence investigating any selection biases that might result thereof is scarce. Henceforth, we conducted two studies drawing from a large multi-national (Study 1; N = 1,081) and a German-speaking sample (Study 2; N = 2,438). As such Study 1 compared iOS and Android users across an array of key personality traits (i.e., well-being, self-esteem, willingness to take risks, optimism, pessimism, Dark Triad, and the Big Five). Focusing on Big Five personality traits in a broader scope, in addition to smartphone users, Study 2 also examined users of the main computer operating systems (i.e., Mac OS, Windows). In both studies, very few significant differences were found, all of which were of small or even tiny effect size mostly disappearing after sociodemographics had been controlled for. Taken together, minor differences in personality seem to exist, but they are of small to negligible effect size (ranging from OR = 0.919 to 1.344 (Study 1), ηp2 = .005 to .036 (Study 2), respectively) and may reflect differences in sociodemographic composition, rather than operating system of smartphone users.

  8. Users of the main smartphone operating systems (iOS, Android differ only little in personality.

    Directory of Open Access Journals (Sweden)

    Friedrich M Götz

    Full Text Available The increasingly widespread use of mobile phone applications (apps as research tools and cost-effective means of vast data collection raises new methodological challenges. In recent years, it has become a common practice for scientists to design apps that run only on a single operating system, thereby excluding large numbers of users who use a different operating system. However, empirical evidence investigating any selection biases that might result thereof is scarce. Henceforth, we conducted two studies drawing from a large multi-national (Study 1; N = 1,081 and a German-speaking sample (Study 2; N = 2,438. As such Study 1 compared iOS and Android users across an array of key personality traits (i.e., well-being, self-esteem, willingness to take risks, optimism, pessimism, Dark Triad, and the Big Five. Focusing on Big Five personality traits in a broader scope, in addition to smartphone users, Study 2 also examined users of the main computer operating systems (i.e., Mac OS, Windows. In both studies, very few significant differences were found, all of which were of small or even tiny effect size mostly disappearing after sociodemographics had been controlled for. Taken together, minor differences in personality seem to exist, but they are of small to negligible effect size (ranging from OR = 0.919 to 1.344 (Study 1, ηp2 = .005 to .036 (Study 2, respectively and may reflect differences in sociodemographic composition, rather than operating system of smartphone users.

  9. Users of the main smartphone operating systems (iOS, Android) differ only little in personality

    Science.gov (United States)

    Stieger, Stefan; Reips, Ulf-Dietrich

    2017-01-01

    The increasingly widespread use of mobile phone applications (apps) as research tools and cost-effective means of vast data collection raises new methodological challenges. In recent years, it has become a common practice for scientists to design apps that run only on a single operating system, thereby excluding large numbers of users who use a different operating system. However, empirical evidence investigating any selection biases that might result thereof is scarce. Henceforth, we conducted two studies drawing from a large multi-national (Study 1; N = 1,081) and a German-speaking sample (Study 2; N = 2,438). As such Study 1 compared iOS and Android users across an array of key personality traits (i.e., well-being, self-esteem, willingness to take risks, optimism, pessimism, Dark Triad, and the Big Five). Focusing on Big Five personality traits in a broader scope, in addition to smartphone users, Study 2 also examined users of the main computer operating systems (i.e., Mac OS, Windows). In both studies, very few significant differences were found, all of which were of small or even tiny effect size mostly disappearing after sociodemographics had been controlled for. Taken together, minor differences in personality seem to exist, but they are of small to negligible effect size (ranging from OR = 0.919 to 1.344 (Study 1), ηp2 = .005 to .036 (Study 2), respectively) and may reflect differences in sociodemographic composition, rather than operating system of smartphone users. PMID:28467473

  10. IO-Link Wireless enhanced factory automation communication for Industry 4.0 applications

    Directory of Open Access Journals (Sweden)

    R. Heynicke

    2018-03-01

    Full Text Available In the context of the Industry 4.0 initiative, Cyber-Physical Production Systems (CPPS or Cyber Manufacturing Systems (CMS can be characterized as advanced networked mechatronic production systems gaining their added value by interaction with the ambient Industrial Internet of Things (IIoT. In this context appropriate communication technologies and standards play a vital role to realize the manifold potential improvements in the production process. One of these standards is IO-Link. In 2016 more than 5 million IO-Link nodes have been produced and delivered, still gaining increasing acceptance for the communication between sensors, actuators and the control level. The steadily increasing demand for more flexibility in automation solutions can be fulfilled using wireless technologies. With the wireless extension for the IO-Link standard, which will be presented in this article, maximum cycle times of 5 ms can be achieved with a probability that this limit will be exceeded to be at maximum one part per billion. Also roaming capabilities, wireless coexistence mechanisms and the possibility to include battery-powered or energy-harvesting sensors with very limited energy resources in the realtime network were defined. For system planning, setup, operation and maintenance, the standard engineering tools of IO-Link can be employed so that the backward compatibility with wired IO-Link solutions can be guaranteed. Interoperability between manufacturers is a key requirement for any communication standard, thus a procedure for IO-Link Wireless testing is also suggested.

  11. Active Storage with Analytics Capabilities and I/O Runtime System for Petascale Systems

    Energy Technology Data Exchange (ETDEWEB)

    Choudhary, Alok [Northwestern Univ., Evanston, IL (United States)

    2015-03-18

    Computational scientists must understand results from experimental, observational and computational simulation generated data to gain insights and perform knowledge discovery. As systems approach the petascale range, problems that were unimaginable a few years ago are within reach. With the increasing volume and complexity of data produced by ultra-scale simulations and high-throughput experiments, understanding the science is largely hampered by the lack of comprehensive I/O, storage, acceleration of data manipulation, analysis, and mining tools. Scientists require techniques, tools and infrastructure to facilitate better understanding of their data, in particular the ability to effectively perform complex data analysis, statistical analysis and knowledge discovery. The goal of this work is to enable more effective analysis of scientific datasets through the integration of enhancements in the I/O stack, from active storage support at the file system layer to MPI-IO and high-level I/O library layers. We propose to provide software components to accelerate data analytics, mining, I/O, and knowledge discovery for large-scale scientific applications, thereby increasing productivity of both scientists and the systems. Our approaches include 1) design the interfaces in high-level I/O libraries, such as parallel netCDF, for applications to activate data mining operations at the lower I/O layers; 2) Enhance MPI-IO runtime systems to incorporate the functionality developed as a part of the runtime system design; 3) Develop parallel data mining programs as part of runtime library for server-side file system in PVFS file system; and 4) Prototype an active storage cluster, which will utilize multicore CPUs, GPUs, and FPGAs to carry out the data mining workload.

  12. Effectiveness of Intraoperative Parathyroid Monitoring (ioPTH) in predicting a multiglandular or malignant parathyroid disease.

    Science.gov (United States)

    Dobrinja, C; Santandrea, G; Giacca, M; Stenner, Elisabetta; Ruscio, Maurizio; de Manzini, Nicolò

    2017-05-01

    The main goal of our study was to confirm the usefulness of intra-operative parathyroid hormone (PTH) monitoring (ioPTH) when using minimally invasive techniques for treatment of sporadic Primary hyperparathyroidism (pHTP). Furthermore, we aimed to evaluate if ioPTH monitoring may help to predict the etiology of primary hyperparathyroidism, especially in malignant or multiglandular parathyroid disease. A retrospective review of 125 consecutive patients with pHPT who underwent parathyroidectomy between 2001 and 2016 at the Department of General Surgery was performed. For each patient, the specific preoperative work-up consisted of: high-resolution US of the neck by a skilled sonographer, sestamibi parathyroid scan, laryngoscopy, and serum measurement of PTH, serum calcium levels, and serum 25(OH)D levels. The study included 125 consecutive patients who underwent surgery for pHPT. At the histological examination, we registered 113 patients with simple adenomatous pathology (90,4%), 5 atypical adenomas (4%), 3 cases of parathyroid carcinoma (2,4%),, , and 4 histological exams of different nature (3,2%). Overall, 6 cases (4,8%) of multiglandular disease were found. We reported 10 cases (8%) of recurrent/persistent hyperparathyroidism: 1/10 in a patient affected by atypical adenoma, 9/10 in patients with benign pathology. Regarding these 10 cases, in three (30%) patients, ioPTH wasn't dosed (only frozen section (FS) exam was taken), in 5 cases (50%) ioPTH dropped more than 50% compared to basal value (false negative results), and in 2 (20%) cases, ioPTH did not drop >50% from the first samples taken, the extemporary exam had confirmed the presence of adenoma and the probable second hyperfunctioning adenoma was not found. IoPTH determinations ensure operative success of surgical resection in almost all hyperfunctioning tissue; in particular it is very important during minimally invasive parathyroidectomy, as it allows avoiding bilateral neck exploration. The use of io

  13. Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers

    OpenAIRE

    Freyberger Michael; He Warren; Akhawe Devdatta; Mazurek Michelle L.; Mittal Prateek

    2018-01-01

    An important line of privacy research is investigating the design of systems for secure input and output (I/O) within Internet browsers. These systems would allow for users’ information to be encrypted and decrypted by the browser, and the specific web applications will only have access to the users’ information in encrypted form. The state-of-the-art approach for a secure I/O system within Internet browsers is a system called ShadowCrypt created by UC Berkeley researchers [23]. This paper wi...

  14. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline...... the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware...

  15. IoT interoperability : a hub-based approach

    OpenAIRE

    Blackstock, Michael; Lea, Rodger

    2014-01-01

    Interoperability in the Internet of Things is critical for emerging services and applications. In this paper we advocate the use of IoT ‘hubs’ to aggregate things using web protocols, and suggest a staged approach to interoperability. In the context of a UK government funded project involving 8 IoT projects to address cross-domain IoT interoperability, we introduce the HyperCat IoT catalogue specification. We then describe the tools and techniques we developed to adapt an existing data portal...

  16. Technology strategy for integrated operations and real time reservoir management; Technology Target Areas; TTA5 - Integrated operations and RTRM

    Energy Technology Data Exchange (ETDEWEB)

    2007-07-01

    Arctic regions; Consequences of IO on HSE, including IT security and vulnerability. The introduction of IO on the NCS is enabling diverse parts of an organisation and its service providers to communicate and collaborate on a whole new level. The physical boundaries of distance and geography are virtually eliminated, with the almost instant availability of data and information wherever one is located. IO and RTRM will provide a significant opportunity for increased production, improved operating efficiency and reserves growth. However, the NCS operators need to understand the consequences of introducing IO on a large scale in order to sustain safe and efficient production Therefore it is vital that HSE consequences are addressed, particularly risks and consequences of the new work processes, and the reliance and hence vulnerability of remotely operated equipment. Emergency procedures, emergency preparedness, installation and information system security are other areas of concern. The Service providers are challenged to share data and communicate across open standard communication interfaces. In this way key business solutions, or even the competitive edge of individual service providers, are shared across a virtual collaborating group of companies. This means that a move from the current conventional supplier-operator relationship, to a gain and risk sharing business relationship is becoming a key component of IO. The industry needs closer links with Universities with regards to student IO education, retraining and building practical experience when it comes to IO and RTRM in the form of internships and summer jobs. It is important to communicate to students and the general public that there will be jobs in the Norwegian oil industry for many years still. The Reservoir management today operates over a period of months and years, however in the future, the rate and quality of data streaming to the reservoir management professional will increase many fold. High resolution

  17. Technology strategy for integrated operations and real time reservoir management; Technology Target Areas; TTA5 - Integrated operations and RTRM

    Energy Technology Data Exchange (ETDEWEB)

    2007-07-01

    particularly for Arctic regions; Consequences of IO on HSE, including IT security and vulnerability. The introduction of IO on the NCS is enabling diverse parts of an organisation and its service providers to communicate and collaborate on a whole new level. The physical boundaries of distance and geography are virtually eliminated, with the almost instant availability of data and information wherever one is located. IO and RTRM will provide a significant opportunity for increased production, improved operating efficiency and reserves growth. However, the NCS operators need to understand the consequences of introducing IO on a large scale in order to sustain safe and efficient production Therefore it is vital that HSE consequences are addressed, particularly risks and consequences of the new work processes, and the reliance and hence vulnerability of remotely operated equipment. Emergency procedures, emergency preparedness, installation and information system security are other areas of concern. The Service providers are challenged to share data and communicate across open standard communication interfaces. In this way key business solutions, or even the competitive edge of individual service providers, are shared across a virtual collaborating group of companies. This means that a move from the current conventional supplier-operator relationship, to a gain and risk sharing business relationship is becoming a key component of IO. The industry needs closer links with Universities with regards to student IO education, retraining and building practical experience when it comes to IO and RTRM in the form of internships and summer jobs. It is important to communicate to students and the general public that there will be jobs in the Norwegian oil industry for many years still. The Reservoir management today operates over a period of months and years, however in the future, the rate and quality of data streaming to the reservoir management professional will increase many fold. High

  18. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    The current Internet of things (IoT) concept is characterized with billions and billions of devices interworking through a myriad of technologies for the delivery of smart personalized services and applications. At the center of these is the human user who drives his/her own interconnected cluster....... This concept has also been introduced elsewhere as “human center sensing (HCS).” The vision pushed by the authors of this chapter for the IoT beyond 2050 is one of the large‐scale and dense HCS connectivities, the complexity of which can be used to extract new IoT value proposition....

  19. IoT Enabled Low Cost Wearable Device for Location and Information Tracking System

    Directory of Open Access Journals (Sweden)

    Kamaludin Nur Atika Binti

    2017-01-01

    Full Text Available An internet-of-things (IoT enabled low cost wearable device for location and information tracking system is developed to monitor and ensure the safety of the children while their parents are away either to work or abroad. This system aims to ensure human safety especially the children and efficiently initiate search and rescue in the event of emergencies. The device will notify the parents on the condition of the surroundings of the children, specifically inside the house and notify the parents if the children are outside the target area by using the application developed in the smartphone. The system uses a microcomputer called Beagle-Bone Black (BBB as the processor while GPS and LTE technology for wireless communication. Future improvement mainly focuses on reducing the size and power consumption of the device, improving communication module, and optimizing microcomputer’s specification.

  20. On the Users’ Acceptance of IoT Systems: A Theoretical Approach

    Directory of Open Access Journals (Sweden)

    Rino Falcone

    2018-03-01

    Full Text Available In the next future the IoT system will introduce extraordinary changes in our daily life. We will communicate with our domestic appliances to inform them about our preferences and goals and they will develop initiative and autonomy to be put at our service. But are we sure that we can afford all the automation they could offer? Are we able to manage it? Is it compatible with our cognitive attitudes and our actual and real goals? In this paper, we face the question of the IoT from the point of view of the user. We start analyzing which reasons undermine the acceptance of IoT systems and then we propose a possible solution. The first contribution of this work is the level characterization of the autonomy a user can grant to an IoT device. The second contribution is a theoretical model to deal with users and to stimulate users’ acceptance. By the means of simulation, we show how the model works and we prove that it leads the system to an optimal solution.

  1. Volcanism on Jupiter's moon Io and its relation to interior processes

    Science.gov (United States)

    Hamilton, Christopher

    2013-04-01

    Jupiter's moon Io is the most volcanically active body in the Solar System and offers insight into processes of tidal heating, melt generation, and magma ascent. Investigating these processes contributes to a better understanding of Io's geologic history, internal structure, and tidal dissipation mechanisms, as well as to understanding similar processes operating on other tidally-heated worlds (e.g., Europa, Enceladus, and some exoplanets). Four recent developments provide new observational constraints that prompt re-examination of the relationships between Io's surficial geology and interior structure. These developments include: (1) completion of the first 1:15,000,000 scale geologic map of Io based on a synthesis of Voyager and Galileo data; (2) re-interpretation of Galileo magnetometer data, which suggests that Io has a globally continuous subsurface magma ocean; (3) new global surveys of the power output from volcanic centers on Io; and (4) identification of an offset between volcano concentrations and surface heat flux maxima predicted by solid body tidal heating models. In this study, the spatial distributions of volcanic hotspots and paterae on Io are characterized using distance-based clustering techniques and nearest neighbor statistics. Distance-based clustering results support a dominant role for asthenospheric heating within Io, but show a 30-60° eastward offset in volcano concentrations relative to locations of predicted surface heat flux maxima. The observed asymmetry in volcano concentrations, with respect to the tidal axis, cannot be explained by existing solid body tidal heating models. However, identification of a global magma ocean within Io raises the intriguing possibility that a fluid tidal response—analogous to the heating of icy satellites by fluid tidal dissipation in their liquid oceans—may modify Io's thermal budget and locations of enhanced volcanism. The population density of volcanoes is greatest near the equator, which also

  2. IoT Privacy and Security Challenges for Smart Home Environments

    Directory of Open Access Journals (Sweden)

    Huichen Lin

    2016-07-01

    Full Text Available Often the Internet of Things (IoT is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic environments, human issues may be as important as technical issues. After surveying existing solutions for enhancing IoT security, the paper identifies key future requirements for trusted Smart Home systems. A gateway architecture is selected as the most appropriate for resource-constrained devices, and for high system availability. Two key technologies to assist system auto-management are identified. Firstly, support for system auto-configuration will enhance system security. Secondly, the automatic update of system software and firmware is needed to maintain ongoing secure system operation.

  3. Securing IoT Devices at CERN

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    CERN has more than 1000 Internet of Things (IoT) devices, which are connected to the office network. We have been doing the research to find all vulnerable IoT devices in CERN and mitigated them. We are currently working on detecting IoT devices automatically and, moreover, identifying the manufacturer, model and the running firmware version. This will help the CERN Computer Security Team to spot vulnerable devices and to show the security risks associated with them.

  4. Does Io's ionosphere influence Jupiter's radio bursts.

    Science.gov (United States)

    Webster, D. L.; Alksne, A. Y.; Whitten, R. C.

    1972-01-01

    Goldreich and Lynden-Bell's theory of Jupiter's Io-correlated decametric radiation sets a lower limit to Io's conductivity, high enough to carry the current associated with the radiated power. Dermott's analysis of conductivities of rocks and ice shows no such conductivity at Io's temperature. However, we show that if Io has even a small atmosphere, say of methane as suggested by Binder and Cruikshank, or of argon or nitrogen, it will have an ionosphere with adequate conductivity to meet the above criterion. A requirement for higher conductivity was found by Goldreich and Lynden-Bell on the basis of motion of magnetic lines past Io. This requirement appears to us unnecessary in view of experiments which prove that motion of the lines is not the source of the electromotance.

  5. Collaborative Operations for Personnel Recovery

    Science.gov (United States)

    2008-02-01

    framework of the NASA TLX will be used to discuss the implications of the Co-OPR system on workload. The NASA TLX is a subjective workload assessment tool...that allows users to perform subjective workload assessments on operator(s) working with various human- machine systems. NASA TLX is a multi...Bundy, A.), IOS Press. Tate, A. (2006) The Helpful Environment: distributed agents and services which cooperate, in "Cooperative Information Agents X

  6. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

    Directory of Open Access Journals (Sweden)

    Michele De Donno

    2018-01-01

    Full Text Available The Internet of Things (IoT revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far.

  7. The atmosphere and ionosphere of Io

    International Nuclear Information System (INIS)

    McElroy, M.B.; Yung, Y.L.

    1975-01-01

    A variety of models for Io's atmosphere, ionosphere, surface, and environment are developed and discussed in the context of recent observational data. The sodium emission detected by Brown appears to require a collisional excitation process in Io's atmosphere, and the extended sodium emission measured by Trafton et al. may require scattering of the planetary radiation by an extended sodium cloud. The sodium is presumably present initially in bound form on Io's surface and may be released by the sputtering mechanism suggested by Matson et al. The ionosphere detected by the radio occultation experiment on Pioneer 10 could be attributed to photoionization of atmospheric sodium if Io's atmosphere could sustain significant vertical motions, of order 1 s/sup -1/ directed up during the day, down at night. Vertical motions of this magnitude could be driven by condensation of atmospheric NH 3 . The total density of gas at Io's surface appears to lie in the range 10 10 -10 12 molecules cm/sup -3/. Corpuscular ionization could play an additional role for the ionosphere. In this case the sateSe should exhibit an exceedingly bright, approx.10 kR, airglow at Lα. The incomplete hydrogen torus observed by Judge and Carlson in the vicinity of Io requires a large supply of hydrogen from the satellite's atmosphere. The escape flux should be of order 10 11 cm/sup -2/ s/sup -1/ and could be maintained by photolysis of atmospheric NH 3 . The observed geometry of the hydrogen torus appears to require a surprisingly short lifetime, approx.10 5 s, for neutral hydrogen near Io's orbit, and may indicate the presence of a large flux, approx.10 9 cm/sup -2/ s/sup -1/, of low-energy protons in Jupiter's magnetosphere. Implications of the hydrogen torus for the energy and mass balance of Jupiter's magnetosphere are discussed briefly, and observational programs are identified which might illuminate present uncertainties in our understanding of Io

  8. Energy-Neutral Data Collection Rate Control for IoT Animal Behavior Monitors

    Directory of Open Access Journals (Sweden)

    Jay Wilhelm

    2017-11-01

    Full Text Available Energy-neutral operation (ENO is a major concern for Internet of things (IoT sensor systems. Animals can be tagged with IoT sensors to monitor their movement and behavior. These sensors wirelessly upload collected data and can receive parameters to change their operation. Typically, the behavior monitors are powered by a battery where the system relies upon harvesting solar radiation for sustainable operation. Solar panels typically are used as the harvesting mechanism and can have a level of uncertainty regarding consistent energy delivery due to factors such as adverse weather, foliage, time of day, and individual animal behavior. The variability of available energy inevitably creates a trade-off in the rate at which data can be collected with respect to incoming and stored energy. The objective of this research was to investigate and simulate methods and parameters that can control the data collection rate of an IoT behavior monitor to achieve sustained operation with unknown and random energy harvesting. Analysis and development of a control system were performed by creating a software model of energy consumption and then simulating using different initial conditions and random energy harvesting rates for evaluation. The contribution of this effort was the exploration into the usage of a discrete-time gain scheduled Proportional–Integral–Derivative (PID that was tuned to a specific device configuration, using battery state of charge as an input, and found to maintain a battery level set-point, reject small solar harvesting energy disturbances, and maintain a consistent data collection rate throughout the day.

  9. Modeling IoT-Based Solutions Using Human-Centric Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Álvaro Monares

    2014-08-01

    Full Text Available The Internet of Things (IoT has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  10. Modeling IoT-based solutions using human-centric wireless sensor networks.

    Science.gov (United States)

    Monares, Álvaro; Ochoa, Sergio F; Santos, Rodrigo; Orozco, Javier; Meseguer, Roc

    2014-08-25

    The Internet of Things (IoT) has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  11. Heat flow from Io /JI/

    Science.gov (United States)

    Matson, D. L.; Ransford, G. A.; Johnson, T. V.

    1981-01-01

    The existing ground-based measurements of Io's thermal emission at infrared wavelengths of 8.4, 10.6, and 21 microns have been reexamined. Present in these data is the signature of hot spots, presumably similar to the hot spots seen by the IRIS experiment on Voyager. It is possible to extract from these data the total amount of power radiated. Since the hot spots are believed to be a result of deep-seated activity in Io and since the remainder of Io's surface is an extraordinarily poor thermal conductor, the power radiated by the hot spots is essentially the total heat flow. The analysis yields a heat flow of 2 + or - 1 W/sq m. This value is tremendously large in comparison to the average heat flow of the earth (0.06 W/sq m) and the moon (0.02 W/sq m), but is characteristic of active geothermal areas on the earth. A heat flow this large requires that the interior of Io be at least partially molten on a global scale.

  12. An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT

    Directory of Open Access Journals (Sweden)

    V. Beltran

    2017-01-01

    Full Text Available Much has been said about the benefits that the Internet of Things (IoT will bring to citizens’ life. Countless smart objects will be soon offering autonomous behavior in smart environments by sensing the physical world around us, collecting information about us, and taking proactive actions (many times without our consent with the ultimate goal of improving our wellness. Without a strong guarantee on user privacy, the IoT may sound scary for many citizens. Indeed, the IoT-Architecture Reference Model (IoT-ARM is a European effort for promoting IoT quality aspects such as security and privacy. This paper paves the way to the adoption of reference architectures by describing the application of the IoT-ARM within a European-funded project, SMARTIE. The SMARTIE architecture has been designed to empower citizens to take control of their IoT devices and privacy, while guaranteeing scalability for large deployments in smart cities.

  13. AirPrint Forensics: Recovering the Contents and Metadata of Printed Documents from iOS Devices

    Directory of Open Access Journals (Sweden)

    Luis Gómez-Miralles

    2015-01-01

    data they may store, opens new opportunities in the field of computer forensics. In 2010, version 4 of the iOS operating system introduced AirPrint, a simple and driverless wireless printing functionality supported by hundreds of printer models from all major vendors. This paper describes the traces left in the iOS device when AirPrint is used and presents a method for recovering content and metadata of documents that have been printed.

  14. TRIO: Burst Buffer Based I/O Orchestration

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Teng [Auburn University; Oral, H Sarp [ORNL; Pritchard, Michael [Auburn University; Wang, Bin [Auburn University; Yu, Weikuan [Auburn University

    2015-01-01

    The growing computing power on leadership HPC systems is often accompanied by ever-escalating failure rates. Checkpointing is a common defensive mechanism used by scientific applications for failure recovery. However, directly writing the large and bursty checkpointing dataset to parallel filesystem can incur significant I/O contention on storage servers. Such contention in turn degrades the raw bandwidth utilization of storage servers and prolongs the average job I/O time of concurrent applications. Recently burst buffer has been proposed as an intermediate layer to absorb the bursty I/O traffic from compute nodes to storage backend. But an I/O orchestration mechanism is still desired to efficiently move checkpointing data from bursty buffers to storage backend. In this paper, we propose a burst buffer based I/O orchestration framework, named TRIO, to intercept and reshape the bursty writes for better sequential write traffic to storage severs. Meanwhile, TRIO coordinates the flushing orders among concurrent burst buffers to alleviate the contention on storage server bandwidth. Our experimental results reveal that TRIO can deliver 30.5% higher bandwidth and reduce the average job I/O time by 37% on average for data-intensive applications in various checkpointing scenarios.

  15. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    The current Internet of things (IoT) concept is characterized with billions and billions of devices interworking through a myriad of technologies for the delivery of smart personalized services and applications. At the center of these is the human user who drives his/her own interconnected cluster....... It can be expected in the future that the number of such clusters will grow exponentially, leading to an ultradense environment of interconnected devices belonging to the same or different clusters with the human user as the center point for the information being sensed, gathered, and processed...

  16. Big Data Clustering via Community Detection and Hyperbolic Network Embedding in IoT Applications.

    Science.gov (United States)

    Karyotis, Vasileios; Tsitseklis, Konstantinos; Sotiropoulos, Konstantinos; Papavassiliou, Symeon

    2018-04-15

    In this paper, we present a novel data clustering framework for big sensory data produced by IoT applications. Based on a network representation of the relations among multi-dimensional data, data clustering is mapped to node clustering over the produced data graphs. To address the potential very large scale of such datasets/graphs that test the limits of state-of-the-art approaches, we map the problem of data clustering to a community detection one over the corresponding data graphs. Specifically, we propose a novel computational approach for enhancing the traditional Girvan-Newman (GN) community detection algorithm via hyperbolic network embedding. The data dependency graph is embedded in the hyperbolic space via Rigel embedding, allowing more efficient computation of edge-betweenness centrality needed in the GN algorithm. This allows for more efficient clustering of the nodes of the data graph in terms of modularity, without sacrificing considerable accuracy. In order to study the operation of our approach with respect to enhancing GN community detection, we employ various representative types of artificial complex networks, such as scale-free, small-world and random geometric topologies, and frequently-employed benchmark datasets for demonstrating its efficacy in terms of data clustering via community detection. Furthermore, we provide a proof-of-concept evaluation by applying the proposed framework over multi-dimensional datasets obtained from an operational smart-city/building IoT infrastructure provided by the Federated Interoperable Semantic IoT/cloud Testbeds and Applications (FIESTA-IoT) testbed federation. It is shown that the proposed framework can be indeed used for community detection/data clustering and exploited in various other IoT applications, such as performing more energy-efficient smart-city/building sensing.

  17. Rutes amb iOS

    OpenAIRE

    Nofuentes Azcárate, Pedro

    2011-01-01

    Projecte de l'implementació d'una aplicació per registrar i gestionar recorreguts basada al sistema operatiu iOS amb la possibilitat de sincronitzar amb un servei web sobre la plataforma Google App Engine. Proyecto de implementación de una aplicación para registrar y gestionar recorridos basada en el sistema operativo iOS con la posibilidad de sincronizar con un servicio web sobre la plataforma Google App Engine. Implementation project for an application to record and manage routes, bas...

  18. IO Sphere: The Professional Journal of Joint Information Operations. Special Edition 2008

    Science.gov (United States)

    2008-01-01

    both the information and political levels; • The natural gas conflict between Ukraine and Russia,; a conflict over meat and milk products trade; as...of friendly forces. Deception is measures designed to mislead the enemy by manipulation, distortion, or falsification of information, to induce...categorizing new methods that are not criminalized in our legislation, such as computer crimes: • Falsif ication of electronic documents and credit cards

  19. Information Operations Primer

    Science.gov (United States)

    2008-11-01

    Nomination/Assignment/Allotment. • Electronic Warfare (EW) deconfliction via Joint Restricted Frequency List (JRFL) creation and analysis. • JRFL...restricted frequency list . The objectives of defensive IO include the following: 111 ■ Sustain the MAGTF commander‘s freedom of action...estimates and are also applied during the analysis and selection of friendly courses of action. (JP 1-02) Joint restricted frequency list (JRFL) A

  20. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  1. Light-Weight and Versatile Monitor for a Self-Adaptive Software Framework for IoT Systems

    Directory of Open Access Journals (Sweden)

    Young-Joo Kim

    2016-01-01

    Full Text Available Today, various Internet of Things (IoT devices and applications are being developed. Such IoT devices have different hardware (HW and software (SW capabilities; therefore, most applications require customization when IoT devices are changed or new applications are created. However, the applications executed on these devices are not optimized for power and performance because IoT device systems do not provide suitable static and dynamic information about fast-changing system resources and applications. Therefore, this paper proposes a light-weight and versatile monitor for a self-adaptive software framework to automatically control system resources according to the system status. The monitor helps running applications guarantee low power consumption and high performance for an optimal environment. The proposed monitor has two components: a monitoring component, which provides real-time static and dynamic information about system resources and applications, and a controlling component, which supports real-time control of system resources. For the experimental verification, we created a video transport system based on IoT devices and measured the CPU utilization by dynamic voltage and frequency scaling (DVFS for the monitor. The results demonstrate that, for up to 50 monitored processes, the monitor shows an average CPU utilization of approximately 4% in the three DVFS modes and demonstrates maximum optimization in the Performance mode of DVFS.

  2. A reference architecture for IoT-based logistic information systems in agrifood supply chains

    NARCIS (Netherlands)

    Verdouw, C.N.; Robbemond, R.M.; Verwaart, T.; Wolfert, J.; Beulens, A.J.M.

    2015-01-01

    Logistics in the food and agribusiness industry must address perishable products, unpredictable supply variations and stringent food safety and sustainability requirements. The Internet of Things (IoT) could contribute significantly to solve these challenges because it allows for remotely

  3. Programming iOS 6

    CERN Document Server

    Neuburg, Matt

    2013-01-01

    Get a solid grounding in all the fundamentals of Cocoa Touch, and avoid problems during iPhone and iPad app development. With this revised and expanded edition, you'll dig into Cocoa and learn how to work effectively with Objective-C and Xcode. This book covers iOS 6 in a rigorous, orderly fashion-ideal whether you're approaching iOS for the first time or need a reference to bolster existing skills. Learn about features introduced with iOS 6, including Objective-C language advances, autosynthesis, autolayout, new view controller rotation rules, unwind segues, state restoration, styled text, and collection views. * Learn Objective-C language details and object-oriented programming concepts * Understand the anatomy of an Xcode project and all the stages of its lifecycle * Grasp key Cocoa concepts such as relationships between classes, receiving events, and model-view-controller architecture * Learn how views and layers are managed, drawn, composited, and animated * Become familiar with view controllers and thei...

  4. IoT-Based Information System for Healthcare Application: Design Methodology Approach

    Directory of Open Access Journals (Sweden)

    Damian Dziak

    2017-06-01

    Full Text Available Over the last few decades, life expectancy has increased significantly. However, elderly people who live on their own often need assistance due to mobility difficulties, symptoms of dementia or other health problems. In such cases, an autonomous supporting system may be helpful. This paper proposes the Internet of Things (IoT-based information system for indoor and outdoor use. Since the conducted survey of related works indicated a lack of methodological approaches to the design process, therefore a Design Methodology (DM, which approaches the design target from the perspective of the stakeholders, contracting authorities and potential users, is introduced. The implemented solution applies the three-axial accelerometer and magnetometer, Pedestrian Dead Reckoning (PDR, thresholding and the decision trees algorithm. Such an architecture enables the localization of a monitored person within four room-zones with accuracy; furthermore, it identifies falls and the activities of lying, standing, sitting and walking. Based on the identified activities, the system classifies current activities as normal, suspicious or dangerous, which is used to notify the healthcare staff about possible problems. The real-life scenarios validated the high robustness of the proposed solution. Moreover, the test results satisfied both stakeholders and future users and ensured further cooperation with the project.

  5. iOS 5 Essentials

    CERN Document Server

    Daniel, Steven F

    2012-01-01

    Each chapter will take you through a new major feature of iOS 5. You will learn how to integrate each feature into your applications. If you ever wanted to learn about the latest features of iOS 5 and learn how to incorporate Twitter, iCloud and Core Image framework effects functionality into your applications, then this book is for you. You should have a good knowledge of programming experience with Objective-C, and have used Xcode 4. iPhone programming experience is not required.

  6. Use of new components in ios5

    OpenAIRE

    Cvenkel, Gašper

    2012-01-01

    Technological development of mobile technology is very fast now days, which contribute to increasing number of smart phones available on the market. Those phones are driven by different operating systems, which are developing, getting new features and upgrades. That is one of the reasons to introduce new features of iOS 5 (iCloud, Storyboard, Notification Center), compare them with competition and present pros and cons. The very rapid development is also reflected by the fact, that it is alre...

  7. Exploring of Wireless Technology to Provide Information Sharing Among Military, United Nations and Civilian Organizations During Complex Humanitarian Emergencies and Peacekeeping Operations

    National Research Council Canada - National Science Library

    Bridges, Douglas

    2003-01-01

    ...) and peacekeeping operations. Humanitarian emergencies and peacekeeping operations are a complex mix of related activities that require the combined efforts of the UN, military, International Organizations (IOs...

  8. On the Benefits and Challenges of Crowd-Sourced Network Performance Measurements for IoT Scenarios

    DEFF Research Database (Denmark)

    Mikkelsen, Lars Møller; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2018-01-01

    Systems within IoT domains such as ITS, Smart City, Smart Grid and other, often rely on real-time information and communication. These types of systems often include geographically distributed nodes which are connected via cellular or other wireless networks. This means great variability and unce......Systems within IoT domains such as ITS, Smart City, Smart Grid and other, often rely on real-time information and communication. These types of systems often include geographically distributed nodes which are connected via cellular or other wireless networks. This means great variability...

  9. Choosing your IoT programming framework : architectural aspects

    NARCIS (Netherlands)

    Rahman, L.F.; Ozcelebi, T.; Lukkien, J.J.

    2016-01-01

    The Internet of Things (IoT) is turning into practice. To drive innovations, it is crucial that programmers have means to develop IoT applications in the form of IoT programming frameworks. These are toolkits to develop applications according to a certain style or method and that let developers

  10. Synthesizing Knowledge on Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Liu, Fei; Tan, Chee-Wee; Lim, Eric T. K.

    2016-01-01

    Research on Internet of Things (IoT) has been booming for past couple of years due to technological advances and its potential for application. Nonetheless, the rapid growth of IoT articles as well as the heterogeneous nature of IoT pose challenges in synthesizing prior research on the phenomenon...

  11. An IoT System for Remote Monitoring of Patients at Home

    Directory of Open Access Journals (Sweden)

    KeeHyun Park

    2017-03-01

    Full Text Available Application areas that utilize the concept of IoT can be broadened to healthcare or remote monitoring areas. In this paper, a remote monitoring system for patients at home in IoT environments is proposed, constructed, and evaluated through several experiments. To make it operable in IoT environments, a protocol conversion scheme between ISO/IEEE 11073 protocol and oneM2M protocol, and a Multiclass Q-learning scheduling algorithm based on the urgency of biomedical data delivery to medical staff are proposed. In addition, for the sake of patients’ privacy, two security schemes are proposed—the separate storage scheme of data in parts and the Buddy-ACK authorization scheme. The experiment on the constructed system showed that the system worked well and the Multiclass Q-learning scheduling algorithm performs better than the Multiclass Based Dynamic Priority scheduling algorithm. We also found that the throughputs of the Multiclass Q-learning scheduling algorithm increase almost linearly as the measurement time increases, whereas the throughputs of the Multiclass Based Dynamic Priority algorithm increase with decreases in the increasing ratio.

  12. NIMS Observation of Hotspots on Io

    Science.gov (United States)

    1996-01-01

    Io has been imaged by the Near Infrared Mapping Spectrometer (NIMS) on Galileo. The image on the right shows for the first time the distribution of volcanic hotspots on the surface of Io, as seen by NIMS. Three of these hotspots are new discoveries, only detectable with the NIMS instrument. This image was taken during the G1 encounter on June 29 1996. The image on the left shows the same view of Io as seen by the Voyager spacecraft in 1979. At least one dozen hotspots have been identified from this NIMS image. Most of the hotspot locations can be matched with volcanic features on the surface of Io, including the vent area of the active Prometheus plume.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov.

  13. Data Compatibility to Enhance Sustainable Capabilities for Autonomous Analytics in IoT

    Directory of Open Access Journals (Sweden)

    Kaleem Razzaq Malik

    2017-05-01

    Full Text Available The collection of raw data is based on sensors embedded in devices or the environment for real-time data extraction. Nowadays, the Internet of Things (IoT environment is used to support autonomous data collection by reducing human involvement. It is hard to analyze such data, especially when working with the sensors in a real-time environment. On using data analytics in IoT with the help of RDF, many issues can be resolved. Resultant data will have a better chance of quality analytics by reforming data into the semantical annotation. Industrial correspondence through data will be improved by the induction of semantics at large due to efficient data capturing, whereas one popular medium of sensors’ data storage is Relational Database (RDB. This study provides a complete automated mechanism to transform from loosely structured data stored in RDB into RDF. These data are obtained from sensors in semantically annotated RDF stores. The given study comprises methodology for improving compatibility by introducing bidirectional transformation between classical DB and RDF data stores to enhance the sustainable capabilities of IoT systems for autonomous analytics. Two case studies, one on weather and another on heart-rate measurement collections through IoT sensors, are used to show the transformation process in operation.

  14. Volcanogenic Sulfur on Earth and Io: Composition and Spectroscopy

    Science.gov (United States)

    Kargel, J.S.; Delmelle, P.; Nash, D.B.

    1999-01-01

    The causes of Io's variegated surface, especially the roles of sulfur, and the geochemical history of sulfur compounds on Io are not well understood. Suspecting that minor impurities in sulfur might be important, we have investigated the major and trace element chemistry and spectroscopic reflectance of natural sulfur from a variety of terrestrial volcanic-hydrothermal environments. Evidence suggests that Io may be substantially coated with impure sulfur. On Earth, a few tenths of a percent to a few percent of chalcophile trace elements (e.g., As and Se) comonly occur in sulfur and appear to stabilize material of yellow, brown, orange, and red hues, which may persist even at low temperatures. Percentage levels of chalcophile impurities are reasonably expected to occur on Io in vapor sublimate deposits and flows derived from such deposits. Such impurities join a host of other mechanisms that might explain Io's reds and yellows. Two-tenths to two percent opaque crystalline impurities, particularly pyrite (FeS2), commonly produces green, gray, and black volcanic sulfur on Earth and might explain areas of Io having deposits of these colors. Pyrite produces a broad absorption near 1 ??m that gradually diminishes out to 1.6 ??m - similar but not identical to the spectrum of Io seen in Galileo NIMS data. Percentage amounts of carbonaceous impurities and tens of percent SiO2 (as silicates) also strongly affect the spectral properties of Earth's sulfur. Io's broad absorption between 0.52 and 0.64 ??m remains unexplained by these data but could be due to sodium sulfides, as suggested previously by others, or to As, Se, or other impurities. These impurities and others, such as P and Cl (which could exist on Io's surface in amounts over 1% that of sulfur), greatly alter the molecular structure of molten and solid sulfur. Minor impurities could impact Io's geology, such as the morphology of sulfur lava flows and the ability of sulfur to sustain high relief. We have not found

  15. An Eruption on Io

    Science.gov (United States)

    2007-01-01

    The first images returned to Earth by New Horizons during its close encounter with Jupiter feature the Galilean moon Io, snapped with the Long Range Reconnaissance Imager (LORRI) at 0840 UTC on February 26, while the moon was 2.5 million miles (4 million kilometers) from the spacecraft. Io is intensely heated by its tidal interaction with Jupiter and is thus extremely volcanically active. That activity is evident in these images, which reveal an enormous dust plume, more than 150 miles high, erupting from the volcano Tvashtar. The plume appears as an umbrella-shaped feature of the edge of Io's disk in the 11 o'clock position in the right image, which is a long-exposure (20-millisecond) frame designed specifically to look for plumes like this. The bright spots at 2 o'clock are high mountains catching the setting sun; beyond them the night side of Io can be seen, faintly illuminated by light reflected from Jupiter itself. The left image is a shorter exposure -- 3 milliseconds -- designed to look at surface features. In this frame, the Tvashtar volcano shows as a dark spot, also at 11 o'clock, surrounded by a large dark ring, where an area larger than Texas has been covered by fallout from the giant eruption. This is the clearest view yet of a plume from Tvashtar, one of Io's most active volcanoes. Ground-based telescopes and the Galileo Jupiter orbiter first spotted volcanic heat radiation from Tvashtar in November 1999, and the Cassini spacecraft saw a large plume when it flew past Jupiter in December 2000. The Keck telescope in Hawaii picked up renewed heat radiation from Tvashtar in spring 2006, and just two weeks ago the Hubble Space Telescope saw the Tvashtar plume in ultraviolet images designed to support the New Horizons flyby. Most of those images will be stored onboard the spacecraft for downlink to Earth in March and April.

  16. Big Data Clustering via Community Detection and Hyperbolic Network Embedding in IoT Applications

    Directory of Open Access Journals (Sweden)

    Vasileios Karyotis

    2018-04-01

    Full Text Available In this paper, we present a novel data clustering framework for big sensory data produced by IoT applications. Based on a network representation of the relations among multi-dimensional data, data clustering is mapped to node clustering over the produced data graphs. To address the potential very large scale of such datasets/graphs that test the limits of state-of-the-art approaches, we map the problem of data clustering to a community detection one over the corresponding data graphs. Specifically, we propose a novel computational approach for enhancing the traditional Girvan–Newman (GN community detection algorithm via hyperbolic network embedding. The data dependency graph is embedded in the hyperbolic space via Rigel embedding, allowing more efficient computation of edge-betweenness centrality needed in the GN algorithm. This allows for more efficient clustering of the nodes of the data graph in terms of modularity, without sacrificing considerable accuracy. In order to study the operation of our approach with respect to enhancing GN community detection, we employ various representative types of artificial complex networks, such as scale-free, small-world and random geometric topologies, and frequently-employed benchmark datasets for demonstrating its efficacy in terms of data clustering via community detection. Furthermore, we provide a proof-of-concept evaluation by applying the proposed framework over multi-dimensional datasets obtained from an operational smart-city/building IoT infrastructure provided by the Federated Interoperable Semantic IoT/cloud Testbeds and Applications (FIESTA-IoT testbed federation. It is shown that the proposed framework can be indeed used for community detection/data clustering and exploited in various other IoT applications, such as performing more energy-efficient smart-city/building sensing.

  17. Xamarin mobile application development for iOS

    CERN Document Server

    Johnson, Paul F

    2013-01-01

    This book is a standard tutorial aimed at teaching you everything you need to know about iOS app development using Xamarin.This book is written for those who are new to iOS app development as well as more experienced developers who just need a quick reference book. It is assumed that you are already comfortable using C#. Those teaching iOS to new students will also find this book invaluable as a form of reference material.

  18. MDTM: Optimizing Data Transfer using Multicore-Aware I/O Scheduling

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Liang [Fermilab; Demar, Phil [Fermilab; Wu, Wenji [Fermilab; Kim, Bockjoo [Florida U.

    2017-05-09

    Bulk data transfer is facing significant challenges in the coming era of big data. There are multiple performance bottlenecks along the end-to-end path from the source to destination storage system. The limitations of current generation data transfer tools themselves can have a significant impact on end-to-end data transfer rates. In this paper, we identify the issues that lead to underperformance of these tools, and present a new data transfer tool with an innovative I/O scheduler called MDTM. The MDTM scheduler exploits underlying multicore layouts to optimize throughput by reducing delay and contention for I/O reading and writing operations. With our evaluations, we show how MDTM successfully avoids NUMA-based congestion and significantly improves end-to-end data transfer rates across high-speed wide area networks.

  19. MDTM: Optimizing Data Transfer using Multicore-Aware I/O Scheduling

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Liang [Fermilab; Demar, Phil [Fermilab; Wu, Wenji [Fermilab; Kim, Bockjoo [Florida U.

    2017-01-01

    Bulk data transfer is facing significant challenges in the coming era of big data. There are multiple performance bottlenecks along the end-to-end path from the source to destination storage system. The limitations of current generation data transfer tools themselves can have a significant impact on end-to-end data transfer rates. In this paper, we identify the issues that lead to underperformance of these tools, and present a new data transfer tool with an innovative I/O scheduler called MDTM. The MDTM scheduler exploits underlying multicore layouts to optimize throughput by reducing delay and contention for I/O reading and writing operations. With our evaluations, we show how MDTM successfully avoids NUMA-based congestion and significantly improves end-to-end data transfer rates across high-speed wide area networks.

  20. International Organizations (IOs), Epistemic Tools of Influence, and the Colonial Geopolitics of Knowledge Production in Higher Education Policy

    Science.gov (United States)

    Shahjahan, Riyad A.

    2016-01-01

    While other scholars have analyzed the way that international organizations (IOs) in higher education policy may contribute to neocolonial domination, this paper illuminates not only on "how" IOs' epistemic activities promulgate one-size fit all solutions, but centers the colonial structures of knowledge/power that inform the…

  1. RubyMotion iOS develoment essentials

    CERN Document Server

    Nalwaya, Abhishek

    2013-01-01

    This is a step-by-step book that builds on your knowledge by adding to an example app over the course of each chapter. Each topic uses example code that can be compiled and tested to show how things work practically instead of just telling you the theory. Complicated tasks are broken down into easy to follow steps with clear explanations of what each line of code is doing.Whether you are a novice to iOS development or looking for a simpler alternative to Objective-C; with RubyMotion iOS Development Essentials, you will become a pro at writing great iOS apps

  2. An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT

    OpenAIRE

    Beltran, V.; Skarmeta, A. F.; Ruiz, P. M.

    2017-01-01

    Much has been said about the benefits that the Internet of Things (IoT) will bring to citizens’ life. Countless smart objects will be soon offering autonomous behavior in smart environments by sensing the physical world around us, collecting information about us, and taking proactive actions (many times without our consent) with the ultimate goal of improving our wellness. Without a strong guarantee on user privacy, the IoT may sound scary for many citizens. Indeed, the IoT-Architecture Refer...

  3. IoT-B&B: Edge-Based NFV for IoT Devices with CPE Crowdsourcing

    Directory of Open Access Journals (Sweden)

    He Zhu

    2018-01-01

    Full Text Available For embracing the ubiquitous Internet-of-Things (IoT devices, edge computing and Network Function Virtualization (NFV have been enabled in branch offices and homes in the form of virtual Customer-Premises Equipment (vCPE. A Service Provider (SP deploys vCPE instances as Virtual Network Functions (VNFs on top of generic physical Customer-Premises Equipment (pCPE to ease administration. Upon a usage surge of IoT devices at a certain part of the network, vCPU, memory, and other resource limitations of a single pCPE node make it difficult to add new services handling the high demand. In this paper, we present IoT-B&B, a novel architecture featuring resource sharing of pCPE nodes. When a pCPE node has sharable resources available, the SP will utilize its free resources as a “bed-and-breakfast” place to deploy vCPE instances in need. A placement algorithm is also presented to assign vCPE instances to a cost-efficient pCPE node. By keeping vCPE instances at the network edge, their costs of hosting are reduced. Meanwhile, the transmission latencies are maintained at acceptable levels for processing real-time data burst from IoT devices. The traffic load to the remote, centralized cloud can be substantially reduced.

  4. Sabatilles : Adaptació a iOS

    OpenAIRE

    Cots Sanfeliu, Jordi

    2015-01-01

    Adaptació del conte en format paper Sabatilles a aplicació en iOS per a dispositius mòbils d'Apple. Adaptación del cuento en formato papel Sabatilles a aplicación en iOS para dispositivos móviles de Apple. Bachelor thesis for the Computer Science program.

  5. Internet of Things (IoT) Applicability in a Metropolitan City

    OpenAIRE

    Dr. D Mohammed

    2015-01-01

    Internet of Things (IoT)is defined here as a network of interconnected objects. These objects can include several technological systems. This paper examines the wireless communication systems and IoT sensors. IoT is technically feasible today, allowing people and things to be connected anytime, anyplace, with anything and anyone. IoT privacy is a concern but security solutions exist today to solve these issues. A proposal is made to use secure IoT solutions in supporting the metropolitan need...

  6. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  7. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  8. Internet of Tangible Things (IoTT: Challenges and Opportunities for Tangible Interaction with IoT

    Directory of Open Access Journals (Sweden)

    Leonardo Angelini

    2018-01-01

    Full Text Available In the Internet of Things era, an increasing number of everyday objects are able to offer innovative services to the user. However, most of these devices provide only smartphone or web user interfaces. As a result, the interaction is disconnected from the physical world, decreasing the user experience and increasing the risk of user alienation from the physical world. We argue that tangible interaction can counteract this trend and this article discusses the potential benefits and the still open challenges of tangible interaction applied to the Internet of Things. After an analysis of open challenges for Human-Computer Interaction in IoT, we summarize current trends in tangible interaction and extrapolate eight tangible interaction properties that could be exploited for designing novel interactions with IoT objects. Through a systematic review of tangible interaction applied to IoT, we show what has been already explored in the systems that pioneered the field and the future explorations that still have to be conducted. In order to guide future work in this field, we propose a design card set for supporting the generation of tangible interfaces for IoT objects. The card set has been evaluated during a workshop with 21 people and the results are discussed.

  9. Augmented communication with haptic I/O in mobile devices

    OpenAIRE

    Haverinen, Laura

    2012-01-01

    Nonverbal communication is a very important part of face to face communication. Both explicit and implicit additions to verbal communication augment the information content of communication. Before telephones did not provide any means for adding nonverbal information to the communication, but now, as the technology has advanced, it is possible to start augmenting also the communication on the phone. Adding a haptic I/O device to a regular mobile phone opens possibilities to add value to commu...

  10. On the road to secure and privacy-preserving IoT ecosystems

    OpenAIRE

    Hernández Serrano, Juan; Muñoz Tapia, José Luis; Bröring, Arne; Esparza Martín, Óscar; Mikkelsen, Lars; Schwarzott, Wolfgang; León Abarca, Olga; Zibuschka, Jan

    2017-01-01

    The Internet of Things (IoT) is on the rise. Today, various IoT platforms are already available, giving access to myriads of things. Initiatives such as BIG IoT are bringing those IoT platforms together in order to form ecosystems. BIG IoT aims to facilitate cross-platform and cross-domain application developments and establish centralized marketplaces to allow resource monetization. This combination of multi-platform applications, heterogeneity of the IoT, as well as enabling marketing and a...

  11. An Optimizing Compiler for Petascale I/O on Leadership Class Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Choudhary, Alok [Northwestern Univ., Evanston, IL (United States); Kandemir, Mahmut [Pennsylvania State Univ., State College, PA (United States)

    2015-03-18

    In high-performance computing systems, parallel I/O architectures usually have very complex hierarchies with multiple layers that collectively constitute an I/O stack, including high-level I/O libraries such as PnetCDF and HDF5, I/O middleware such as MPI-IO, and parallel file systems such as PVFS and Lustre. Our project explored automated instrumentation and compiler support for I/O intensive applications. Our project made significant progress towards understanding the complex I/O hierarchies of high-performance storage systems (including storage caches, HDDs, and SSDs), and designing and implementing state-of-the-art compiler/runtime system technology that targets I/O intensive HPC applications that target leadership class machine. This final report summarizes the major achievements of the project and also points out promising future directions.

  12. Network Security Issues in The Internet of Things (IoT)

    OpenAIRE

    Millar, Stuart

    2016-01-01

    This paper surveys a broad range of other research works in order to discuss network security issues in the Internet of Things (IoT). We begin with setting the scene generally with an outline of IoT, followed by a discussion of IoT layer models and topologies. After this, IoT standardization efforts and protocols are analysed, before we discuss in depth vulnerabilities, attacks and mitigations with regard IoT. It is concluded that ample research and narrative exists for protocols and vulnerab...

  13. CCM-R: Secure Counter Synchronization for IoT Wireless Link

    DEFF Research Database (Denmark)

    Roy, Upal; Yin, Jiachen; Andersen, Birger

    2016-01-01

    In this paper we propose and evaluate a new version of the CCM mode of operation, CCM-R, which isan extended and alternate version of the original CBC-MAC with Counter Mode(CCM) that was created to address the problem of counter synchronization. While CCM is considered secure when used/implemente...... it suitable for low-power wireless IoT devices....

  14. Reliable IoT Storage: Minimizing Bandwidth Use in Storage Without Newcomer Nodes

    DEFF Research Database (Denmark)

    Zhao, Xiaobo; Lucani Rötter, Daniel Enrique; Shen, Xiaohong

    2018-01-01

    This letter characterizes the optimal policies for bandwidth use and storage for the problem of distributed storage in Internet of Things (IoT) scenarios, where lost nodes cannot be replaced by new nodes as is typically assumed in Data Center and Cloud scenarios. We develop an information flow...... model that captures the overall process of data transmission between IoT devices, from the initial preparation stage (generating redundancy from the original data) to the different repair stages with fewer and fewer devices. Our numerical results show that in a system with 10 nodes, the proposed optimal...

  15. A Step Towards Checking Security in IoT

    Directory of Open Access Journals (Sweden)

    Chiara Bodei

    2016-08-01

    Full Text Available The Internet of Things (IoT is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

  16. A Step Towards Checking Security in IoT

    OpenAIRE

    Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio

    2016-01-01

    The Internet of Things (IoT) is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

  17. Io's Active Eruption Plumes: Insights from HST

    Science.gov (United States)

    Jessup, K. L.; Spencer, J. R.

    2011-10-01

    Taking advantage of the available data, we recently [10] completed a detailed analysis of the spectral signature of Io's Pele-type Tvashtar plume as imaged by the HST Wide Field and Planetary Camera 2 (HST/WFPC2) via absorption during Jupiter transit and via reflected sunlight in 2007, as well as HST/WFPC2 observations of the 1997 eruption of Io's Prometheus-type Pillan plume (Fig. 1). These observations were obtained in the 0.24-0.42 μm range, where the plumes gas absorption and aerosol scattering properties are most conspicuous. By completing a detailed analysis of these observations, several key aspects of the reflectance and the absorption properties of the two plumes have been revealed. Additionally, by considering the analysis of the HST imaging data in light of previously published spectral analysis of Io's Prometheus and Pele-type plumes several trends in the plume properties have been determined, allowing us to define the relative significance of each plume on the rate of re-surfacing occurring on Io and providing the measurements needed to better assess the role the volcanoes play in the stability of Io's tenuous atmosphere.

  18. Clustering Approaches for Pragmatic Two-Layer IoT Architecture

    Directory of Open Access Journals (Sweden)

    J. Sathish Kumar

    2018-01-01

    Full Text Available Connecting all devices through Internet is now practical due to Internet of Things. IoT assures numerous applications in everyday life of common people, government bodies, business, and society as a whole. Collaboration among the devices in IoT to bring various applications in the real world is a challenging task. In this context, we introduce an application-based two-layer architectural framework for IoT which consists of sensing layer and IoT layer. For any real-time application, sensing devices play an important role. Both these layers are required for accomplishing IoT-based applications. The success of any IoT-based application relies on efficient communication and utilization of the devices and data acquired by the devices at both layers. The grouping of these devices helps to achieve the same, which leads to formation of cluster of devices at various levels. The clustering helps not only in collaboration but also in prolonging overall network lifetime. In this paper, we propose two clustering algorithms based on heuristic and graph, respectively. The proposed clustering approaches are evaluated on IoT platform using standard parameters and compared with different approaches reported in literature.

  19. Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers

    Directory of Open Access Journals (Sweden)

    Freyberger Michael

    2018-04-01

    Full Text Available An important line of privacy research is investigating the design of systems for secure input and output (I/O within Internet browsers. These systems would allow for users’ information to be encrypted and decrypted by the browser, and the specific web applications will only have access to the users’ information in encrypted form. The state-of-the-art approach for a secure I/O system within Internet browsers is a system called ShadowCrypt created by UC Berkeley researchers [23]. This paper will explore the limitations of ShadowCrypt in order to provide a foundation for the general principles that must be followed when designing a secure I/O system within Internet browsers. First, we developed a comprehensive UI attack that cannot be mitigated with popular UI defenses, and tested the efficacy of the attack through a user study administered on Amazon Mechanical Turk. Only 1 of the 59 participants who were under attack successfully noticed the UI attack, which validates the stealthiness of the attack. Second, we present multiple attack vectors against Shadow-Crypt that do not rely upon UI deception. These attack vectors expose the privacy weaknesses of Shadow DOM—the key browser primitive leveraged by ShadowCrypt. Finally, we present a sketch of potential countermeasures that can enable the design of future secure I/O systems within Internet browsers.

  20. Building IoT Services for Aging in Place Using Standard-Based IoT Platforms and Heterogeneous IoT Products

    Directory of Open Access Journals (Sweden)

    Sheik Mohammad Mostakim Fattah

    2017-10-01

    Full Text Available An aging population and human longevity is a global trend. Many developed countries are struggling with the yearly increasing healthcare cost that dominantly affects their economy. At the same time, people living with old adults suffering from a progressive brain disorder such as Alzheimer’s disease are enduring even more stress and depression than those patients while caring for them. Accordingly, seniors’ ability to live independently and comfortably in their current home for as long as possible has been crucial to reduce the societal cost for caregiving and thus give family members peace of mind, called ‘aging in place’ (AIP. In this paper we present a way of building AIP services using standard-based IoT platforms and heterogeneous IoT products. An AIP service platform is designed and created by combining previous standard-based IoT platforms in a collaborative way. A service composition tool is also created that allows people to create AIP services in an efficient way. To show practical usability of our proposed system, we choose a service scenario for medication compliance and implement a prototype service which could give old adults medication reminder appropriately at the right time (i.e., when it is time to need to take pills through light and speaker at home but also wrist band and smartphone even outside the home.

  1. Building IoT Services for Aging in Place Using Standard-Based IoT Platforms and Heterogeneous IoT Products.

    Science.gov (United States)

    Fattah, Sheik Mohammad Mostakim; Sung, Nak-Myoung; Ahn, Il-Yeup; Ryu, Minwoo; Yun, Jaeseok

    2017-10-11

    An aging population and human longevity is a global trend. Many developed countries are struggling with the yearly increasing healthcare cost that dominantly affects their economy. At the same time, people living with old adults suffering from a progressive brain disorder such as Alzheimer's disease are enduring even more stress and depression than those patients while caring for them. Accordingly, seniors' ability to live independently and comfortably in their current home for as long as possible has been crucial to reduce the societal cost for caregiving and thus give family members peace of mind, called 'aging in place' (AIP). In this paper we present a way of building AIP services using standard-based IoT platforms and heterogeneous IoT products. An AIP service platform is designed and created by combining previous standard-based IoT platforms in a collaborative way. A service composition tool is also created that allows people to create AIP services in an efficient way. To show practical usability of our proposed system, we choose a service scenario for medication compliance and implement a prototype service which could give old adults medication reminder appropriately at the right time (i.e., when it is time to need to take pills) through light and speaker at home but also wrist band and smartphone even outside the home.

  2. IOS SAFETY APPLICATION FOR UITM

    Directory of Open Access Journals (Sweden)

    MOHAMAD FAHMI HUSSIN

    2016-04-01

    Full Text Available This paper presents an iOS application, which is developed, to ensure that every task related to safety and health such as inspection, deviation analysis and accident reporting becomes more simple and easier. Normally, these three (3 tasks are done separately and the data are saved in different ways. These situations make the tasks become complicated and consume a lot of time. Therefore, this application is developed to overcome all the problems that occurred. The main objective of this application is to allow the user to handle inspection checklist, deviation analysis and accident reporting efficiently by using iOS devices such as iPhone and iPad. Hence, using iOS device, instead of using a lot of paper, can do all the tasks. Using Xcode SDK, which is the software that is used to develop iOS application, developed this application. Xcode use Objective-C as the programming language, which is quite similar with other programming languages such as C and C++. The final result of this project is that this application can handle all the three (3 tasks and the form or the findings can be emailed to the Safety and Health Officer (SHO. This application will reduce time consume to conduct safety inspection, deviation and reporting tasks as well as avoid delay that might happen while using the traditional method.

  3. Embodied energy of construction materials: integrating human and capital energy into an IO-based hybrid model.

    Science.gov (United States)

    Dixit, Manish K; Culp, Charles H; Fernandez-Solis, Jose L

    2015-02-03

    Buildings alone consume approximately 40% of the annual global energy and contribute indirectly to the increasing concentration of atmospheric carbon. The total life cycle energy use of a building is composed of embodied and operating energy. Embodied energy includes all energy required to manufacture and transport building materials, and construct, maintain, and demolish a building. For a systemic energy and carbon assessment of buildings, it is critical to use a whole life cycle approach, which takes into account the embodied as well as operating energy. Whereas the calculation of a building's operating energy is straightforward, there is a lack of a complete embodied energy calculation method. Although an input-output-based (IO-based) hybrid method could provide a complete and consistent embodied energy calculation, there are unresolved issues, such as an overdependence on price data and exclusion of the energy of human labor and capital inputs. This paper proposes a method for calculating and integrating the energy of labor and capital input into an IO-based hybrid method. The results demonstrate that the IO-based hybrid method can provide relatively complete results. Also, to avoid errors, the total amount of human and capital energy should not be excluded from the calculation.

  4. Getting Priorities Straight: Improving Linux Support for Database I/O

    DEFF Research Database (Denmark)

    Hall, Christoffer; Bonnet, Philippe

    2005-01-01

    advantage of Linux asynchronous I/O and how Linux can help MySQL/InnoDB best take advantage of the underlying I/O bandwidth. This is a crucial problem for the increasing number of MySQL servers deployed for very large database applications. In this paper, we rst show that the conservative I/O submission......The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, we evaluate how MySQL/InnoDB can best take...... policy used by InnoDB (as well as Oracle 9.2) leads to an under-utilization of the available I/O bandwidth. We then show that introducing prioritized asynchronous I/O in Linux will allow MySQL/InnoDB and the other Linux databases to fully utilize the available I/O bandwith using a more aggressive I...

  5. Design and Implementation of Cloud-Centric Configuration Repository for DIY IoT Applications.

    Science.gov (United States)

    Ahmad, Shabir; Hang, Lei; Kim, Do Hyeun

    2018-02-06

    The Do-It-Yourself (DIY) vision for the design of a smart and customizable IoT application demands the involvement of the general public in its development process. The general public lacks the technical knowledge for programming state-of-the-art prototyping and development kits. The latest IoT kits, for example, Raspberry Pi, are revolutionizing the DIY paradigm for IoT, and more than ever, a DIY intuitive programming interface is required to enable the masses to interact with and customize the behavior of remote IoT devices on the Internet. However, in most cases, these DIY toolkits store the resultant configuration data in local storage and, thus, cannot be accessed remotely. This paper presents the novel implementation of such a system, which not only enables the general public to customize the behavior of remote IoT devices through a visual interface, but also makes the configuration available everywhere and anytime by leveraging the power of cloud-based platforms. The interface enables the visualization of the resources exposed by remote embedded resources in the form of graphical virtual objects (VOs). These VOs are used to create the service design through simple operations like drag-and-drop and the setting of properties. The configuration created as a result is maintained as an XML document, which is ingested by the cloud platform, thus making it available to be used anywhere. We use the HTTP approach for the communication between the cloud and IoT toolbox and the cloud and real devices, but for communication between the toolbox and actual resources, CoAP is used. Finally, a smart home case study has been implemented and presented in order to assess the effectiveness of the proposed work.

  6. Design and Implementation of Cloud-Centric Configuration Repository for DIY IoT Applications

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad

    2018-02-01

    Full Text Available The Do-It-Yourself (DIY vision for the design of a smart and customizable IoT application demands the involvement of the general public in its development process. The general public lacks the technical knowledge for programming state-of-the-art prototyping and development kits. The latest IoT kits, for example, Raspberry Pi, are revolutionizing the DIY paradigm for IoT, and more than ever, a DIY intuitive programming interface is required to enable the masses to interact with and customize the behavior of remote IoT devices on the Internet. However, in most cases, these DIY toolkits store the resultant configuration data in local storage and, thus, cannot be accessed remotely. This paper presents the novel implementation of such a system, which not only enables the general public to customize the behavior of remote IoT devices through a visual interface, but also makes the configuration available everywhere and anytime by leveraging the power of cloud-based platforms. The interface enables the visualization of the resources exposed by remote embedded resources in the form of graphical virtual objects (VOs. These VOs are used to create the service design through simple operations like drag-and-drop and the setting of properties. The configuration created as a result is maintained as an XML document, which is ingested by the cloud platform, thus making it available to be used anywhere. We use the HTTP approach for the communication between the cloud and IoT toolbox and the cloud and real devices, but for communication between the toolbox and actual resources, CoAP is used. Finally, a smart home case study has been implemented and presented in order to assess the effectiveness of the proposed work.

  7. Strong tidal dissipation in Io and Jupiter from astrometric observations.

    Science.gov (United States)

    Lainey, Valéry; Arlot, Jean-Eudes; Karatekin, Ozgür; Van Hoolst, Tim

    2009-06-18

    Io is the volcanically most active body in the Solar System and has a large surface heat flux. The geological activity is thought to be the result of tides raised by Jupiter, but it is not known whether the current tidal heat production is sufficiently high to generate the observed surface heat flow. Io's tidal heat comes from the orbital energy of the Io-Jupiter system (resulting in orbital acceleration), whereas dissipation of energy in Jupiter causes Io's orbital motion to decelerate. Here we report a determination of the tidal dissipation in Io and Jupiter through its effect on the orbital motions of the Galilean moons. Our results show that the rate of internal energy dissipation in Io (k(2)/Q = 0.015 +/- 0.003, where k(2) is the Love number and Q is the quality factor) is in good agreement with the observed surface heat flow, and suggest that Io is close to thermal equilibrium. Dissipation in Jupiter (k(2)/Q = (1.102 +/- 0.203) x 10(-5)) is close to the upper bound of its average value expected from the long-term evolution of the system, and dissipation in extrasolar planets may be higher than presently assumed. The measured secular accelerations indicate that Io is evolving inwards, towards Jupiter, and that the three innermost Galilean moons (Io, Europa and Ganymede) are evolving out of the exact Laplace resonance.

  8. An Optimizing Compiler for Petascale I/O on Leadership-Class Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Kandemir, Mahmut Taylan [PSU; Choudary, Alok [Northwestern; Thakur, Rajeev [ANL

    2014-03-01

    In high-performance computing (HPC), parallel I/O architectures usually have very complex hierarchies with multiple layers that collectively constitute an I/O stack, including high-level I/O libraries such as PnetCDF and HDF5, I/O middleware such as MPI-IO, and parallel file systems such as PVFS and Lustre. Our DOE project explored automated instrumentation and compiler support for I/O intensive applications. Our project made significant progress towards understanding the complex I/O hierarchies of high-performance storage systems (including storage caches, HDDs, and SSDs), and designing and implementing state-of-the-art compiler/runtime system technology that targets I/O intensive HPC applications that target leadership class machine. This final report summarizes the major achievements of the project and also points out promising future directions Two new sections in this report compared to the previous report are IOGenie and SSD/NVM-specific optimizations.

  9. An IoT Project for Vital Signs Monitoring

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2017-01-01

    Full Text Available Nowadays, the Internet of Things (IoT projects are very popular and they are developed for numerous fields. In order to detect various medical problems on time, it is required to monitor the subjects either human or non-human. This could be used on regular or specific activities, like sport or work. It is necessary to determine the factors that could lead to medical problems. Another important aspect is to quantify the factors, to monitor them, to collect data and to make the proper interpretation. This could be achieved using dedicated sensors, controlled by an application embedded on a development board. When a dangerous value is reached, the system has to inform the subject (if human or someone else (if non-human. This paper presents an Arduino based IoT project used for monitoring the vital signs for human and non-human and the results based on its usage. The paper details the hardware and software components of this project.

  10. Application development with Parse using iOS SDK

    CERN Document Server

    Birani, Bhanu

    2013-01-01

    A practical guide, featuring step-by-step instructions showing you how to use Parse iOS, and handle your data on cloud.If you are a developer who wants to build your applications instantly using Parse iOS as a back end application development, this book is ideal for you. This book will help you to understand Parse, featuring examples to help you get familiar with the concepts of Parse iOS.

  11. SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers

    Directory of Open Access Journals (Sweden)

    Vishal Sharma

    2017-01-01

    Full Text Available Internet of things (IoT aims at bringing together large business enterprise solutions and architectures for handling the huge amount of data generated by millions of devices. For this aim, IoT is necessary to connect various devices and provide a common platform for storage and retrieval of information without fail. However, the success of IoT depends on the novelty of network and its capability in sustaining the increasing demand by users. In this paper, a self-aware communication architecture (SACA is proposed for sustainable networking over IoT devices. The proposed approach employs the concept of mobile fog servers which make relay using the train and unmanned aerial vehicle (UAV networks. The problem is presented based on Wald’s maximum model, which is resolved by the application of a distributed node management (DNM system and state dependency formulations. The proposed approach is capable of providing prolonged connectivity by increasing the network reliability and sustainability even in the case of failures. The effectiveness of the proposed approach is demonstrated through numerical and network simulations in terms of significant gains attained with lesser delay and fewer packet losses. The proposed approach is also evaluated against Sybil, wormhole, and DDoS attacks for analyzing its sustainability and probability of connectivity in unfavorable conditions.

  12. Strategy Planning Visualization Tool (SPVT) for the Air Operations Center (AOC) Volume I: SPVT Summary and COA Sketch

    Science.gov (United States)

    2009-12-01

    communication events to a specific team member or device, the time to create a product, or a planner’s workload via the NASA TLX . Qualitative metrics...HPW/RHXB, Commander’s Predictive Environment program – SMART), IWPC (GDAIS), Capt. DuBose and Mr. Matt Trippy ESC 950th ELSG Joint IO Planning...primary visualization and information components unique to GEM-S include Operations, Activities & Actions (OAA), Lines of Effects (LOE), IO Assessment

  13. Design, implementation, and evaluation of an Internet of Things (IoT) network system for restaurant food waste management.

    Science.gov (United States)

    Wen, Zongguo; Hu, Shuhan; De Clercq, Djavan; Beck, M Bruce; Zhang, Hua; Zhang, Huanan; Fei, Fan; Liu, Jianguo

    2018-03-01

    Catering companies around the world generate tremendous amounts of waste; those in China are no exception. The paper discusses the design, implementation, and evaluation of a sensor-based Internet of Things (IoT) network technology for improving the management of restaurant food waste (RFW) in the city of Suzhou, China. This IoT-based system encompasses the generation, collection, transportation and final disposal of RFW. The Suzhou case study comprised four steps: (1) examination of the required functionality of an IoT-enabled system in the specific context of Suzhou; (2) configuration of the system architecture, both software and hardware components, according to the identified functionality; (3) installation of the components of the IoT system at the facilities of the stakeholders across the RFW generation-collection-transportation-disposal value chain; and (4) evaluation of the performance of the entire system, based on data from three years of operation. The results show that the system had a strong impact. Positive results include: (1) better management of RFW generation, as evidenced by a 20.5% increase in RFW collected via official channels and a 207% increase in the number of RFW generators under official contract; (2) better law enforcement in response to RFW malpractice, enabled by the monitoring capabilities of the IoT system; and (3) an overall reduction in illicit RFW activities and better process optimization across the RFW value chain. Negative results include: (1) Radio-frequency identification (RFID) tags need to be renewed often due to the frequent handling of waste bins, thus increasing operating costs; (2) dynamic/automatic weight sensors had a higher degree of error than the more time-consuming static/manual weighing method; and (3) there were disagreements between the city's government agencies about how to interpret data from the IoT system, which led to some inefficiencies in management. In sum, the Suzhou IoT system enabled data

  14. Re-integrating Influence and Cyber Operations

    Science.gov (United States)

    2011-06-01

    30 3.6 Social Engineering ......................................................................................................... 33 3.7 The “ Sexy ...need to show results. 3.7 The “ Sexy Part” of IO In early 2001, the 92 nd Information Warfare Aggressor Squadron in San Antonio was struggling with...commander, “Network Operations is the Sexy Part of IO”. This commander was correct in a way, but for reasons unknown at the time. The Air Force has

  15. IoT Security Techniques Based on Machine Learning

    OpenAIRE

    Xiao, Liang; Wan, Xiaoyue; Lu, Xiaozhen; Zhang, Yanyong; Wu, Di

    2018-01-01

    Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques including supervised learning, unsupervised learning and reinforcement learning. We focus on the machine le...

  16. Challenges when bringing IoT into Industrial Automation

    OpenAIRE

    Lennvall, Tomas; Gidlund, Mikael; Åkerberg, Johan

    2017-01-01

    The Internet of Things (IoT) is captivating the society because of its potential to rapidly transform businesses and people’s lives. It is widely believed that IoT will also transform the industrial automation business in terms of improved productivity, less cost, flexibility, and increased revenues. Hence, there are some challenges that needs to be addressed when IoT is introduced to the industrial automation domain. This paperaims to present realistic requirements and highlights identified ...

  17. Topographic evidence for shield volcanism on Io

    International Nuclear Information System (INIS)

    Moore, J.M.; Mcewen, A.S.; Albin, E.F.; Greeley, R.

    1986-01-01

    Similarities between terrestrial shield volcanoes and a volcano on Io observed in Voyager I imagery of the satellite at 30 0 S, 246 0 W are delineated. A photoclinometry model was used to numerically estimate the slope based on the Minnaert photometric function. The slope values are accurate to within 10 deg on the sun-facing slope and 1 deg on the shadow side. As found with shield volcanoes, the feature has a central edifice, 40-50 km in diameter, and a broad, elliptical base, 77 x 90 km across. The summit of the Io volcano is 2.2-2.8 km above the surrounding plane and contains a caldera about 5 km in diameter. The similarity in shape between basaltic terrestrial shield volcanoes and the Io volcano indicates that the Io feature may also be composed of basalt. The composition could be sulfur if the heat flow was under 0.05 W/sq m, as it might have been in later stages of formation. 9 references

  18. Practical comparison of distributed ledger technologies for IoT

    Science.gov (United States)

    Red, Val A.

    2017-05-01

    Existing distributed ledger implementations - specifically, several blockchain implementations - embody a cacophony of divergent capabilities augmenting innovations of cryptographic hashes, consensus mechanisms, and asymmetric cryptography in a wide variety of applications. Whether specifically designed for cryptocurrency or otherwise, several distributed ledgers rely upon modular mechanisms such as consensus or smart contracts. These components, however, can vary substantially among implementations; differences involving proof-of-work, practical byzantine fault tolerance, and other consensus approaches exemplify distinct distributed ledger variations. Such divergence results in unique combinations of modules, performance, latency, and fault tolerance. As implementations continue to develop rapidly due to the emerging nature of blockchain technologies, this paper encapsulates a snapshot of sensor and internet of things (IoT) specific implementations of blockchain as of the end of 2016. Several technical risks and divergent approaches preclude standardization of a blockchain for sensors and IoT in the foreseeable future; such issues will be assessed alongside the practicality of IoT applications among Hyperledger, Iota, and Ethereum distributed ledger implementations suggested for IoT. This paper contributes a comparison of existing distributed ledger implementations intended for practical sensor and IoT utilization. A baseline for characterizing distributed ledger implementations in the context of IoT and sensors is proposed. Technical approaches and performance are compared considering IoT size, weight, and power limitations. Consensus and smart contracts, if applied, are also analyzed for the respective implementations' practicality and security. Overall, the maturity of distributed ledgers with respect to sensor and IoT applicability will be analyzed for enterprise interoperability.

  19. A case study in application I/O on Linux clusters

    International Nuclear Information System (INIS)

    Ross, R.; Nurmi, D.; Cheng, A.; Zingale, M.

    2001-01-01

    A critical but often ignored component of system performance is the I/O system. Today's applications expect a great deal from underlying storage systems and software, and both high performance distributed storage and high level interfaces have been developed to fill these needs. In this paper they discuss the I/O performance of a parallel scientific application on a Linux cluster, the FLASH astrophysics code. This application relies on three I/O software components to provide high performance parallel I/O on Linux clusters: the Parallel Virtual File System (PVFS), the ROMIO MPI-IO implementation, and the Hierarchical Data Format (HDF5) library. First they discuss the roles played by each of these components in providing an I/O solution. Next they discuss the FLASH I/O benchmark and point out its relevance. Following this they examine the performance of the benchmark, and through instrumentation of both the application and underlying system software code they discover the location of major software bottlenecks. They work around the most inhibiting of these bottlenecks, showing substantial performance improvement. Finally they point out similarities between the inefficiencies found here and those found in message passing systems, indicating that research in the message passing field could be leveraged to solve similar problems in high-level I/O interfaces

  20. IoTA: IoT Automated SIP-based Emergency Call Triggering System for general eHealth purposes

    OpenAIRE

    Andriopoulou, F; Orphanoudakis, T; Dagiuklas, A

    2017-01-01

    The expansion of Internet of Things (IoT) and the evolution in communication technologies have enabled homes, cars even whole cities to be network connected. However, during an emergency incident, IoT devices have not been used to trigger emergency calls directly to healthcare providers mainly due to their constrained capabilities and lack of support session-oriented communications. Moreover, emergency services are currently offered by public safety stakeholders that do not support call trigg...

  1. XML as a standard I/O data format in scientific software development

    International Nuclear Information System (INIS)

    Song Tianming; Yang Jiamin; Yi Rongqing

    2010-01-01

    XML is an open standard data format with strict syntax rules, which is widely used in large-scale software development. It is adopted as I/O file format in the development of SpectroSim, a simulation and data-processing system for soft x-ray spectrometer used in ICF experiments. XML data that describe spectrometer configurations, schema codes that define syntax rules for XML and report generation technique for visualization of XML data are introduced. The characteristics of XML such as the capability to express structured information, self-descriptive feature, automation of visualization are explained with examples, and its feasibility as a standard scientific I/O data file format is discussed. (authors)

  2. The Structure and Composition of Io's Atmosphere

    Science.gov (United States)

    Smyth, W. H.; Marconi, M. L.

    2011-12-01

    Io's atmosphere is thought to be generated principally by sublimation on the dayside and by multiple volcanoes scattered throughout its surface and more concentrated near the equator. While SO2 seems to be the principle product of these sources, many other chemical species are placed into the atmosphere by these sources, including substantial amounts of SO and S2 as well as smaller but observationally significant amounts of Na bearing molecules. These species in turn interact strongly with the torus plasma generating additional species such as O2, S, O, and Na. The strong interaction of the torus plasma with the neutral atmosphere not only exerts a profound effect on the composition of Io's atmosphere but also strongly affects the dynamics and thermodynamics of Io's atmosphere, particularly at higher altitudes. In addition, as Io orbits Jupiter, the change in location of the sublimation region and the eclipse of Io as it passes through Jupiter's shadow result in substantial variation in the atmosphere. A complex time-dependent three-dimensional atmosphere with strong spatial compositional variation is created. Here we extend the two-dimensional multispecies Navier-Stokes model of Smyth and Wong (2004) to three-dimensions, include two volcanic sources similar to Pele and Loki, and include the effect of Io's movement around Jupiter on sublimation. The effects of the torus plasma are also included as in Smyth and Wong. We will present the overall composition and structure of the atmosphere, O to S ratios in the upper atmosphere, and discuss a potential issue with the O2 abundance. Smyth, W.H. and M.C. Wong, Icarus 171, 171-182, 2004.

  3. A Cloud-Based Car Parking Middleware for IoT-Based Smart Cities: Design and Implementation

    Directory of Open Access Journals (Sweden)

    Zhanlin Ji

    2014-11-01

    Full Text Available This paper presents the generic concept of using cloud-based intelligent car parking services in smart cities as an important application of the Internet of Things (IoT paradigm. This type of services will become an integral part of a generic IoT operational platform for smart cities due to its pure business-oriented features. A high-level view of the proposed middleware is outlined and the corresponding operational platform is illustrated. To demonstrate the provision of car parking services, based on the proposed middleware, a cloud-based intelligent car parking system for use within a university campus is described along with details of its design, implementation, and operation. A number of software solutions, including Kafka/Storm/Hbase clusters, OSGi web applications with distributed NoSQL, a rule engine, and mobile applications, are proposed to provide ‘best’ car parking service experience to mobile users, following the Always Best Connected and best Served (ABC&S paradigm.

  4. A Cloud-Based Car Parking Middleware for IoT-Based Smart Cities: Design and Implementation

    Science.gov (United States)

    Ji, Zhanlin; Ganchev, Ivan; O'Droma, Máirtín; Zhao, Li; Zhang, Xueji

    2014-01-01

    This paper presents the generic concept of using cloud-based intelligent car parking services in smart cities as an important application of the Internet of Things (IoT) paradigm. This type of services will become an integral part of a generic IoT operational platform for smart cities due to its pure business-oriented features. A high-level view of the proposed middleware is outlined and the corresponding operational platform is illustrated. To demonstrate the provision of car parking services, based on the proposed middleware, a cloud-based intelligent car parking system for use within a university campus is described along with details of its design, implementation, and operation. A number of software solutions, including Kafka/Storm/Hbase clusters, OSGi web applications with distributed NoSQL, a rule engine, and mobile applications, are proposed to provide ‘best’ car parking service experience to mobile users, following the Always Best Connected and best Served (ABC&S) paradigm. PMID:25429416

  5. A cloud-based car parking middleware for IoT-based smart cities: design and implementation.

    Science.gov (United States)

    Ji, Zhanlin; Ganchev, Ivan; O'Droma, Máirtín; Zhao, Li; Zhang, Xueji

    2014-11-25

    This paper presents the generic concept of using cloud-based intelligent car parking services in smart cities as an important application of the Internet of Things (IoT) paradigm. This type of services will become an integral part of a generic IoT operational platform for smart cities due to its pure business-oriented features. A high-level view of the proposed middleware is outlined and the corresponding operational platform is illustrated. To demonstrate the provision of car parking services, based on the proposed middleware, a cloud-based intelligent car parking system for use within a university campus is described along with details of its design, implementation, and operation. A number of software solutions, including Kafka/Storm/Hbase clusters, OSGi web applications with distributed NoSQL, a rule engine, and mobile applications, are proposed to provide 'best' car parking service experience to mobile users, following the Always Best Connected and best Served (ABC&S) paradigm.

  6. INFORMATION ASSURANCE - INTELLIGENCE - INFORMATION SUPERIORITY RELATIONSHIP WITHIN NATO OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe BOARU, Ioan-Mihai ILIEŞ

    2011-01-01

    Full Text Available There is a tight relationship between information assurance, the intelligence cycle and information superiority within NATO operations. The intelligence cycle has a discrete architecture and provides on-time and relevant intelligence products to the joint force commanders and to other authorized users in a specifi c joint area of operations. The intelligence cycle must follow the evolution of the operation. A permanent intelligence estimate will be performed during the military decision making process and operations execution. Information superiority is one of the most powerful intelligence cycle achievements. and decisively infuences the success of NATO joint operations. Information superiority must be preserved and enhanced through information assurance. Information assurance is an information operation that must be planned by the military in charge of operation security or by non-military experts, executed by all personnel during the entire intelligence cycle life time and employed during the planning and execution of NATO joint operations.

  7. Seedbed based on IoT: A Case Study

    OpenAIRE

    J. Kalathas; D.V. Bandekas; A. Kosmidis; V. Kanakaris

    2016-01-01

    Nowadays, the Wireless Sensors Network (WSN) and the Internet of Things (IOT) are widely used in providing decision support systems which solve many problems in the real-world. This paper presents IoT as the best way to solve the agricultural problems, related to seedbed resources optimization, decision making support and seed breeding monitoring. This case study provides real-time information about the seedbed that will help agriculturists make the right decisions during the seed...

  8. Grabens on Io: Evidence for Extensional Tectonics

    Science.gov (United States)

    Hoogenboom, T.; Schenk, P.

    2012-12-01

    Io may well be the most geologically active body in the solar system. A variety of volcanic features have been identified, including a few fissure eruptions, but tectonism is generally assumed to be limited to compression driven mountain formation (Schenk et al., 2001). A wide range of structural features can also be identified including scarps, lineaments, faults, and circular depressions (pits and patera rims). Narrow curvilinear graben (elongated, relatively depressed crustal unit or block that is bounded by faults on its sides) are also scattered across Io's volcanic plains. These features are dwarfed by the more prominent neighboring volcanoes and mountains, and have been largely ignored in the literature. Although they are likely to be extensional in origin, their relationship to local or global stress fields is unknown. We have mapped the locations, length and width of graben on Io using all available Voyager and Galileo images with a resolution better than 5 km. We compare the locations of graben with existing volcanic centers, paterae and mountain data to determine the degree of correlation between these geologic features and major topographic variations (basins/swells) in our global topographic map of Io (White et al., 2011). Graben are best observed in > 1-2 km low-sun angle images. Approximately 300 images were converted from ISIS to ArcMap format to allow easy comparison with the geological map of Io (Williams et al., 2012) along with previous higher resolution structural mapping of local areas (e.g. Crown et al., 1992). We have located >45 graben to date. Typically 1-3 kilometers across, some of these features can stretch for over 500 kilometers in length. Their formation may be related to global tidal stresses or local deformation. Io's orbit is eccentric and its solid surface experiences daily tides of up to ˜0.1 km, leading to repetitive surface strains of 10-4 or greater. These tides flex and stress the lithosphere and can cause it to fracture

  9. Multiscale periodic structure in the Io wake

    Energy Technology Data Exchange (ETDEWEB)

    Smith, P R; Wright, A N

    1989-06-08

    The decametric radio emissions from Jupiter are known to be influenced by the Galilean satellite Io. It is believed that the structure in these emissions is associated with the Alfven-wave wake downstream of Io. However, recent studies have shown that the structure of the wake cannot be as simple as originally thought. Here we present preliminary results from an eigenmode synthesis of the Alfven waves launched by Io, and find that several important periodicities emerge. Observations of the decametric emissions reveal fine, medium-and large-scale structure. The simulation we present here can provide structure on each of these scales, unlike earlier models. (author).

  10. Beginning Swift games development for iOS

    CERN Document Server

    Goodwill, James

    2015-01-01

    Game apps are one of the most popular categories in the Apple iTunes App Store. Well, the introduction of the new Swift programming language will make game development even more appealing and easier to existing and future iOS app developers. In response, James Goodwill, Wesley Matlock and Apress introduce you to this book, Beginning Swift Games Development for iOS. In this book, you'll learn the fundamental elements of the new Swift language as applied to game development for iOS. In part 1, you'll start with a basic 2D game idea and build the game throughout the book introducing each Sprit

  11. APLIKACIJA ZA PRIKAZ SLEDENJA VOZIL NA OPERACIJSKEM SISTEMU iOS

    OpenAIRE

    Mlinar, Tilen

    2011-01-01

    V diplomski nalogi prikazujemo razvoj aplikacije za operacijski sistem iOS. Razvili smo aplikacijo za sledenje vozil. V teoretičnem delu se najprej seznanimo z operacijskim sistemom iOS ter njegovo arhitekturo, nato predstavimo arhitekturo aplikacij iOS. Sledi opis kompleta razvojnih orodij v iOS SDK. V nadaljevanju se seznanimo še s programskim jezikom Objective-C, lokacijsko odvisnimi storitvam, podsistemom MapKit in delovanjem aplikacije v ozadju operacijskega sistema. V praktičnem delu op...

  12. The Haskell Programmer's Guide to the IO Monad : Don't Panic

    NARCIS (Netherlands)

    Klinger, S.

    2005-01-01

    Now, that you have started with Haskell, have you written a program doing IO yet, like reading a file or writing on the terminal? Then you have used the IO monad—but do you understand how it works? The standard explanation is, that the IO monad hides the non-functional IO actions —which do have side

  13. Large Binocular Telescope Observations of Europa Occulting Io's Volcanoes at 4.8 μm

    Science.gov (United States)

    Skrutskie, Michael F.; Conrad, Albert; Resnick, Aaron; Leisenring, Jarron; Hinz, Phil; de Pater, Imke; de Kleer, Katherine; Spencer, John; Skemer, Andrew; Woodward, Charles E.; Davies, Ashley Gerard; Defrére, Denis

    2015-11-01

    On 8 March 2015 Europa passed nearly centrally in front of Io. The Large Binocular Telescope observed this event in dual-aperture AO-corrected Fizeau interferometric imaging mode using the mid-infrared imager LMIRcam operating behind the Large Binocular Telescope Interferometer (LBTI) at a broadband wavelength of 4.8 μm (M-band). Occultation light curves generated from frames recorded every 123 milliseconds show that both Loki and Pele/Pillan were well resolved. Europa's center shifted by 2 kilometers relative to Io from frame-to-frame. The derived light curve for Loki is consistent with the double-lobed structure reported by Conrad et al. (2015) using direct interferometric imaging with LBTI.

  14. Sesame IO Library User Manual Version 8

    Energy Technology Data Exchange (ETDEWEB)

    Abhold, Hilary [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Young, Ginger Ann [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-15

    This document is a user manual for SES_IO, a low-level library for reading and writing sesame files. The purpose of the SES_IO library is to provide a simple user interface for accessing and creating sesame files that does not change across sesame format type (such as binary, ascii, and xml).

  15. Knowledge driven discovery for opportunistic IoT networking.

    OpenAIRE

    Pozza, Riccardo

    2015-01-01

    So far, the Internet of Things (IoT) has been concerned with the objective of connecting every-thing, or any object to the Internet world. By collaborating towards the creation of new services, the IoT has introduced the opportunity to add smartness to our cities, homes, buildings and healthcare systems, as well as businesses and products. In many scenarios, objects or IoT devices are not always statically deployed, but they may be free to move around being carried by people or vehicles, whil...

  16. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices

    Directory of Open Access Journals (Sweden)

    Leandro Marin

    2015-08-01

    Full Text Available The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  17. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.

    Science.gov (United States)

    Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio

    2015-08-28

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  18. Multiple Independent File Parallel I/O with HDF5

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M. C.

    2016-07-13

    The HDF5 library has supported the I/O requirements of HPC codes at Lawrence Livermore National Labs (LLNL) since the late 90’s. In particular, HDF5 used in the Multiple Independent File (MIF) parallel I/O paradigm has supported LLNL code’s scalable I/O requirements and has recently been gainfully used at scales as large as O(106) parallel tasks.

  19. Hash-chain-based authentication for IoT

    Directory of Open Access Journals (Sweden)

    Antonio PINTO

    2016-12-01

    Full Text Available The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT. Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they use batteries and may be required to operate over long periods of time. The majority of these devices perform data collection. The collected data is stored on-line using web-services that, sometimes, operate without any special considerations regarding security and privacy. The current work proposes a modified hash-chain authentication mechanism that, with the help of a smartphone, can authenticate each interaction of the devices with a REST web-service using One Time Passwords (OTP while using open wireless networks. Moreover, the proposed authentication mechanism adheres to the stateless, HTTP-like behavior expected of REST web-services, even allowing the caching of server authentication replies within a predefined time window. No other known web-service authentication mechanism operates in such manner.

  20. An Open Virtual Neighbourhood Network to Connect IoT Infrastructures and Smart Objects – VICINITY

    DEFF Research Database (Denmark)

    Guan, Yajuan; Quintero, Juan Carlos Vasquez; Guerrero, Josep M.

    2017-01-01

    The lack of interoperability is considered as the most important barrier to achieve the global integration of Internet-of-Things (IoT) ecosystems across borders of different disciplines, vendors and standards. Indeed, the current IoT landscape consists of a large set of isolated islands that do...... not constitute a real Internet, preventing the exploitation of the huge potential expected by Information and communications technology (ICT) visionaries and unfolding business opportunities facilitated by digitalization and automation. The VICINITY project will build and demonstrate a platform linking various...

  1. Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different a...

  2. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO.

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-02-07

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  3. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-01-01

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy. PMID:28178214

  4. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Directory of Open Access Journals (Sweden)

    Antonio Celesti

    2017-02-01

    Full Text Available Nowadays, in the panorama of Internet of Things (IoT, finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  5. Instant OpenCV for iOS

    CERN Document Server

    Kornyakov, Kirill

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book uses a very practical approach, with each recipe and their associated sample projects or examples focusing on a particular aspect of the technology.This book is intended for OpenCV developers who are interested in porting their applications to the iOS platform. Basic experience with OpenCV, computer vision, Objective C, and other iOS tools is encouraged.

  6. Semantic Description of IoT Security for Smart Grid

    OpenAIRE

    Ayele, Getinet

    2017-01-01

    Master's thesis Information- and communication technology IKT590 - University of Agder 2017 This research work proposed, developed and evaluated IoT Security ontology for smart home energy management system (SHEMS) in smart grids. The ontology description includes infrastructure, attacks, vulnerabilities and counter measures for the main components of SHEMS such as Smart Meter, Smart Appliance, Home Gateway, and Billing data. The ontology extends the SAREF energy management ontology with s...

  7. On Energy Efficiency of Prioritized IoT Systems

    KAUST Repository

    Alabbasi, Abdulrahman; Shihada, Basem; Cavdar, Cicek

    2018-01-01

    The inevitable deployment of 5G and the Internet of Things (IoT) sheds the light on the importance of the energy efficiency (EE) performance of Device-to- Device (DD) communication systems. In this work, we address a potential IoT application, where

  8. IoT Privacy and Security Challenges for Smart Home Environments

    OpenAIRE

    Huichen Lin; Neil W. Bergmann

    2016-01-01

    Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic enviro...

  9. New upper limits for atmospheric constituents on Io

    Science.gov (United States)

    Fink, U.; Larson, H. P.; Gautier, T. N., III

    1976-01-01

    A spectrum of Io from 0.86 to 2.7 microns with a resolution of 3.36 per cm and a signal to rms noise ratio of 120 is presented. No absorptions due to any atmospheric constituents on Io could be found in the spectrum. Upper limits of 0.12 cm-atm for NH3, 0.12 cm-atm for CH4, 0.4 cm-atm for N2O, and 24 cm-atm for H2S were determined. Laboratory spectra of ammonia frosts as a function of temperature were compared with the spectrum of Io and showed this frost not to be present at the surface of Io. A search for possible resonance lines of carbon, silicon, and sulfur, as well as the 1.08-micron line of helium, proved negative. Upper emission limits of 60, 18, 27, and 60 kilorayleighs, respectively, were established for these lines.

  10. Prototype Pengendalian Lampu Jarak Jauh Dengan Jaringan Internet Berbasis Internet of Things(IoT) Menggunakan Rasberry Pi 3

    OpenAIRE

    Muzawi, Rometdo; Efendi, Yoyon; Sahrun, Nori

    2018-01-01

    Abstract— Internet of Thing (IoT) is a concept that aims to expand the benefits of internet connectivity that is connected continuously. Internet of thing (IoT) can be utilized on buildings to control electronic equipment such as operating room lights remotely through a computer network. Research is done by building a device remote control that utilizes internet technology to perform the process of control in the network local through a web server that is embedded into the remote control devi...

  11. Coverage and Capacity Analysis of LTE-M and NB-IoT in a Rural Area

    DEFF Research Database (Denmark)

    Lauridsen, Mads; Kovács, István; Mogensen, Preben Elgaard

    2016-01-01

    equipped with either of the newly standardized technologies. The study is made for a site specific network deployment of a Danish operator, and the simulation is calibrated using drive test measurements. The results show that LTE-M can provide coverage for 99.9% of outdoor and indoor devices, if the latter......The 3GPP has introduced the LTE-M and NB-IoT User Equipment categories and made amendments to LTE release 13 to support the cellular Internet of Things. The contribution of this paper is to analyze the coverage probability, the number of supported devices, and the device battery life in networks...... is experiencing 10 dB additional loss. However, for deep indoor users NB-IoT is required and provides coverage for about 95% of the users. The cost is support for more than 10 times fewer devices and a 2-6 times higher device power consumption. Thus both LTE-M and NB-IoT provide extended support for the cellular...

  12. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  13. Cross-Layer Energy Optimization for IoT Environments: Technical Advances and Opportunities

    Directory of Open Access Journals (Sweden)

    Kirshna Kumar

    2017-12-01

    Full Text Available Energy efficiency is a significant characteristic of battery-run devices such as sensors, RFID and mobile phones. In the present scenario, this is the most prominent requirement that must be served while introducing a communication protocol for an IoT environment. IoT network success and performance enhancement depend heavily on optimization of energy consumption that enhance the lifetime of IoT nodes and the network. In this context, this paper presents a comprehensive review on energy efficiency techniques used in IoT environments. The techniques proposed by researchers have been categorized based on five different layers of the energy architecture of IoT. These five layers are named as sensing, local processing and storage, network/communication, cloud processing and storage, and application. Specifically, the significance of energy efficiency in IoT environments is highlighted. A taxonomy is presented for the classification of related literature on energy efficient techniques in IoT environments. Following the taxonomy, a critical review of literature is performed focusing on major functional models, strengths and weaknesses. Open research challenges related to energy efficiency in IoT are identified as future research directions in the area. The survey should benefit IoT industry practitioners and researchers, in terms of augmenting the understanding of energy efficiency and its IoT-related trends and issues.

  14. User Requirements for Internet Of Things (IoT) Applications : An Observational study

    OpenAIRE

    Namirimu, Victoria

    2015-01-01

    Context. Internet of Things (IoT) is a new trending phase of technology. IoT refers to communication and connectivity between things such as technological devices, actuators, sensors, and people or processes with unique identifiers. The importance of IoT is to improve the daily living standards of an average user. IoT is made for the people and used by the people for many reasons such as improved health, business innovations, and personal health trackers. Examples of IoT applications and serv...

  15. MedAd-AppQ: A quality assessment tool for medication adherence apps on iOS and android platforms.

    Science.gov (United States)

    Ali, Eskinder Eshetu; Teo, Amanda Kai Sin; Goh, Sherlyn Xue Lin; Chew, Lita; Yap, Kevin Yi-Lwern

    2018-02-02

    With the recent proliferation of smartphone medication adherence applications (apps), it is increasingly more difficult for patients and clinicians to identify the most useful app. To develop a quality assessment tool for medication adherence apps, and evaluate the quality of such apps from the major app stores. In this study, a Medication Adherence App Quality assessment tool (MedAd-AppQ) was developed and two evaluators independently assessed apps that fulfilled the following criteria: availability in English, had at least a medication reminder feature, non-specific to certain disease conditions (generic apps), free of technical malfunctions and availability on both the iPhone Operating System (iOS) and Android platforms. Descriptive statistics, Mann-Whitney U test, Pearson product moment correlation and Spearman rank-order correlation were used for statistical analysis. MedAd-AppQ was designed to have 24 items (total 43 points) categorized under three sections: content reliability (11 points), feature usefulness (29 points) and feature convenience (3 points). The three sections of MedAd-AppQ were found to have inter-rater correlation coefficients of 0.801 (p-value apps (27 iOS and 25 Android), quality scores ranged between 7/43 (16.3%) and 28/43 (65.1%). There was no significant difference between the quality scores of the Android and iOS versions. None of the apps had features for self-management of side effects. Only two apps in each platform provided disease-related and/or medication information. MedAd-AppQ can be used to reliably assess the quality of adherence apps. Clinicians can use the tool in selecting apps for use by patients. Developers of adherence apps should consider features that provide therapy-related information and help patients in medications and side-effects management. Copyright © 2018 Elsevier Inc. All rights reserved.

  16. Stability of sulfur slopes on Io

    Science.gov (United States)

    Clow, G. D.; Carr, M. H.

    1980-01-01

    The mechanical properties of elemental sulfur are such that the upper crust of Io cannot be primarily sulfur. For heat flows in the range 100-1000 ergs/sq cm sec sulfur becomes ductile within several hundred meters of the surface and would prevent the formation of calderas with depths greater than this. However, the one caldera for which precise depth data are available is 2 km deep, and this value may be typical. A study of the mechanical equilibrium of simple slopes shows that the depth to the zone of rapid ductile flow strongly controls the maximum heights for sulfur slopes. Sulfur scarps with heights greater than 1 km will fail for all heat flows greater than 180 ergs/sq cm sec and slope angles greater than 22.5 deg. The observed relief on Io is inconsistent with that anticipated for a predominantly sulfur crust. However, a silicate crust with several percent sulfur included satisfies both the mechanical constraints and the observed presence of sulfur on Io.

  17. ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G

    Directory of Open Access Journals (Sweden)

    Kai Fan

    2017-01-01

    Full Text Available As one of the core techniques in 5G, the Internet of Things (IoT is increasingly attracting people’s attention. Meanwhile, as an important part of IoT, the Near Field Communication (NFC is widely used on mobile devices and makes it possible to take advantage of NFC system to complete mobile payment and merchandise information reading. But with the development of NFC, its problems are increasingly exposed, especially the security and privacy of authentication. Many NFC authentication protocols have been proposed for that, some of them only improve the function and performance without considering the security and privacy, and most of the protocols are heavyweight. In order to overcome these problems, this paper proposes an ultralightweight mutual authentication protocol, named ULMAP. ULMAP only uses Bit and XOR operations to complete the mutual authentication and prevent the denial of service (DoS attack. In addition, it uses subkey and subindex number into its key update process to achieve the forward security. The most important thing is that the computation and storage overhead of ULMAP are few. Compared with some traditional schemes, our scheme is lightweight, economical, practical, and easy to protect against synchronization attack.

  18. QUALITY OF INTER-ORGANIZATIONAL SYSTEM (IOS FRAMEWORK FOR SUPPLY CHAIN MANAGEMENT (SCM: STUDY OF SIX COLLABORATIVE FACTORS FROM SUPPLIER AND CUSTOMER PERSPECTIVES

    Directory of Open Access Journals (Sweden)

    Miloš Mihajlović

    2010-09-01

    Full Text Available This paper has identified a research gap to study how organizations collaborate together to adopt Inter- Organizational System (IOS for Supply Chain Management (SCM. We propose such a framework and then use four theories, namely resource dependency theory, organizational theory, actor-network theory and negotiated order theory, to understand how the framework supports management collaboration and interaction in the adoption of an IOS. This adoption framework is proposed to better study how senior management staff, from both supplier and customer perspectives, collaborate and interact in the IOS adoption process. The framework has been constructed from the literature identifying six major aspects for consideration namely: inter and intra organizational collaboration; strategic management approaches; supply chain design (SCD; business process redesign/reengineering (BPR; information systems (IS / information technology (IT architecture and external environmental factors. From customer and supplier perspectives the adoption of IOS for SCM, makes a significant contribution to knowledge in this field.

  19. Advanced I/O for large-scale scientific applications

    International Nuclear Information System (INIS)

    Klasky, Scott; Schwan, Karsten; Oldfield, Ron A.; Lofstead, Gerald F. II

    2010-01-01

    As scientific simulations scale to use petascale machines and beyond, the data volumes generated pose a dual problem. First, with increasing machine sizes, the careful tuning of IO routines becomes more and more important to keep the time spent in IO acceptable. It is not uncommon, for instance, to have 20% of an application's runtime spent performing IO in a 'tuned' system. Careful management of the IO routines can move that to 5% or even less in some cases. Second, the data volumes are so large, on the order of 10s to 100s of TB, that trying to discover the scientifically valid contributions requires assistance at runtime to both organize and annotate the data. Waiting for offline processing is not feasible due both to the impact on the IO system and the time required. To reduce this load and improve the ability of scientists to use the large amounts of data being produced, new techniques for data management are required. First, there is a need for techniques for efficient movement of data from the compute space to storage. These techniques should understand the underlying system infrastructure and adapt to changing system conditions. Technologies include aggregation networks, data staging nodes for a closer parity to the IO subsystem, and autonomic IO routines that can detect system bottlenecks and choose different approaches, such as splitting the output into multiple targets, staggering output processes. Such methods must be end-to-end, meaning that even with properly managed asynchronous techniques, it is still essential to properly manage the later synchronous interaction with the storage system to maintain acceptable performance. Second, for the data being generated, annotations and other metadata must be incorporated to help the scientist understand output data for the simulation run as a whole, to select data and data features without concern for what files or other storage technologies were employed. All of these features should be attained while

  20. Leveraging BLE and LoRa in IoT Network for Wildlife Monitoring System (WMS)

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Das, Kallol; Meratnia, Nirvana; Havinga, Paul J.M.

    2018-01-01

    In this paper we propose a new dual radio IoT network architecture for wildlife monitoring system (WMS). WMS leverages bluetooth low energy (BLE) in low power wide area networks (LPWANs) by dynamically changing the operating radio based on the proximity among herd of wild animals. This approach will

  1. Leveraging BLE and LoRa in IoT Network for Wildlife Monitoring System (WMS)

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Das, Kallol; Meratnia, Nirvana; Havinga, Paul J.M.

    2016-01-01

    In this paper we propose a new dual radio IoT network architecture for wildlife monitoring system (WMS). WMS leverages bluetooth low energy (BLE) in low power wide area networks (LPWANs) by dynamically changing the operating radio based on the proximity among herd of wild animals. This approach will

  2. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  3. An evaluation of inter-organisational information systems development on business partnership relations

    Directory of Open Access Journals (Sweden)

    Williamson, E.A.

    2007-01-01

    Full Text Available Inter-organisational information systems (IOS are being used within SCM to improve businesses processes and to facilitate closer working relations with business partners. However, the technologies themselves impact on this relationship as they allow various levels of information flows, communications, function integration and partner integration.The aim of this paper is to evaluate IOS development influencing partnership integration within Supply Chain Management (SCM by investigating thirteen businesses that use a variety of IOS. IOS are classified into Elementary IOS, Intermediate IOS and Advanced IOS. Organisational variables such as information flows, partner co-ordination and integration, partner trust and confidence are measured against the level of IOS development. Variables such as management commitment, financial costs, system standards and partner resistance are investigated as forces or barriers, and related to different levels of IOS development.This research concludes that IOS development results in increased information flows and coordination which supports the development of trust and confidence in business partners. However, the customer position in the supply chain, whether it be retailer, distributor or manufacturer can influence the use of IOS of its business partners. Also, although IOS allows businesses to source and contact a larger range of business partners, the tendency is for businesses to use a smaller number of partners. This work also shows that IOS development changes a business’s relationship with its partners and moves it towards partnership integration.However, a number of organisational factors impact on this integration. These factors vary with the level of IOS development. Management commitment and showing the requirement for IOS development can act as a positive force in developing IOS or as a barrier against IOS development. Other barriers include resistance from business partners, financial costs, lack of

  4. Performance Evaluations for IEEE 802.15.4-based IoT Smart Home Solution

    Directory of Open Access Journals (Sweden)

    Nga Dinh

    2016-09-01

    Full Text Available The Internet of Things (IoT is going to be a market-changing force for a variety of real-time applications such as e-healthcare, home automation, environmental monitoring, and industrial automation. Low power wireless communication protocols offering long lifetime and high reliability such as the IEEE 802.15.4 standard have been a key enabling technology for IoT deployments and are deployed for home automation recently. The issues of the IEEE 802.15.4 networks have moved from theory to real world deployments. The work presented herein intends to demonstrate the use of the IEEE 802.15.4 standard in recent IoT commercial products for smart home applications: the Smart Home Starter Kit. The contributions of the paper are twofold. First, the paper presents how the IEEE 802.15.4 standard is employed in Smart Home Starter Kit. In particular, network topology, network operations, and data transfer mode are investigated. Second, network performance metrics such as end-to-end (E2E delay and frame reception ratio (FRR are evaluated by experiments. In addition, the paper discusses several directions for future improvements of home automation commercial products.

  5. A Model of Socially Connected Web Objects for IoT Applications

    OpenAIRE

    Ali, Sajjad; Kibria, Muhammad Golam; Jarwar, Muhammad Aslam; Lee, Hoon Ki; Chong, Ilyoung

    2018-01-01

    The Internet of Things (IoT) is evolving with the connected objects at an unprecedented rate, bringing about enormous opportunities for the future IoT applications as well as challenges. One of the major challenges is to handle the complexity generated by the interconnection of billions of objects. However, Social Internet of Things (SIoT), emerging from the conglomeration of IoT and social networks, has realized an efficient way to facilitate the development of complex future IoT application...

  6. Radial and azimuthal distribution of Io's oxygen neutral cloud observed by Hisaki/EXCEED

    Science.gov (United States)

    Koga, R.; Tsuchiya, F.; Kagitani, M.; Sakanoi, T.; Yoneda, M.; Yoshikawa, I.; Yoshioka, K.; Murakami, G.; Yamazaki, A.; Kimura, T.; Smith, H. T.

    2017-12-01

    We report the spatial distributions of oxygen neural cloud surrounding Jupiter's moon Io and along Io's orbit observed by the HISAKI satellite. Atomic oxygen and sulfur in Io's atmosphere escape from the exobase and move to corona ( 5.8 Io radii) mainly due to atmospheric sputtering. Io plasma torus is formed by ionization of these atoms by electron impact and charge exchange processes. It is essential to examine the dominant source of Io plasma torus, particularly in the vicinity of Io (5.8 Io radii; extended neutral clouds). The spatial distribution of oxygen and sulfur neutral clouds is important to understand the source. The extreme ultraviolet spectrometer called EXCEED (Extreme Ultraviolet Spectroscope for Exospheric Dynamics) installed on the Hisaki satellite observed Io plasma torus continuously in 2014-2015, and we carried out the monitoring of the distribution of atomic oxygen emission at 130.4 nm. The emission averaged over the distance range of 4.5-6.5 Jovian radii on the dawn and dusk sides strongly depends on the Io phase angle (IPA), and has a emission peak between IPA of 60-90 degrees on the dawn side, and between 240-270 degrees on the dusk side, respectively. It also shows the asymmetry with respect to Io's position: the intensity averaged for IPA 60-90 degrees (13.3 Rayleighs (R)) is 1.2 times greater than that for IPA 90-120 degrees (11.1 R) on the dawn side. The similar tendency is found on the dusk side. Weak atomic oxygen emission (4 R) uniformly distributes in every IPA. We also examined the radial distribution of the oxygen neutral cloud during the same period and found the emission peak near Io's orbit with decreasing the intensity toward 8.0 Jupiter radii. The results show the high density component of the oxygen neutral cloud is concentrated around Io and extends mainly toward leading side of Io. In addition, the low density neutrals uniformly exist along Io's orbit. Both components extend radially outward up to 8 Jovian radii with

  7. Studi atas Pemanfaatan Blockchain bagi Internet of Things (IoT

    Directory of Open Access Journals (Sweden)

    Lathifah Arief

    2017-08-01

    Full Text Available Ekosistem Internet of Things (IoT berkembang dengan sangat cepat dan diperkirakan akan menghubungkan 5-20 miliar perangkat pada tahun 2020. Data yang dihimpun dari perangkat ini akan mencapai jumlah yang sangat besar. Saat ini, ekosistem IoT pada umumnya menggunakan model sistem terpusat. Model tersebut memiliki beberapa kelemahan, seperti biaya pemeliharaan yang relatif tinggi, Sistem terdistribusi dapat menjadi alternatif solusi. Blockchain, teknologi ledger terditribusi, memungkinkan transaksi peer-to-peer tanpa perlu adanya perantara pihak ketiga yang terpercaya. Paper ini bertujuan untuk mengeksplorasi potensi pengintegrasian Blockchain ke dalam ekosistem IoT. Hasil penelitian berupa model dan use-case pemanfaatan Blockchain dalam IoT.

  8. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    Directory of Open Access Journals (Sweden)

    Yunchuan Guo

    2014-01-01

    Full Text Available Access control is a key technology in providing security in the Internet of Things (IoT. The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC. STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM and the election-based update mechanism (EUM. We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  9. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    Science.gov (United States)

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  10. Cyber Power Theory First, Then Information Operations

    National Research Council Canada - National Science Library

    Smart, Antoinette G

    2001-01-01

    ...) seems disconcerting, at least on the surface. Think tanks, government research organizations, and learned individuals have all pointed to the need for a viable theory of IO, yet no such theory has emerged...

  11. Internet of Robotic Things – Converging Sensing/Actuating, Hyperconnectivity, Artificial Intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias Z.; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing new developments in various application domains, such as the Internet of Mobile Things (IoMT), Autonomous Internet of Things (A-IoT), Autonomous System of Things (ASoT), Internet of Autonomous Things (IoAT), Internet of Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc. that are progressing/advancing by using IoT technology. The IoT influence represents new development and deployment challenges in diffe...

  12. UMAMI: A Recipe for Generating Meaningful Metrics through Holistic I/O Performance Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Lockwood, Glenn K. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Yoo, Wucherl [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Byna, Suren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Wright, Nicholas J. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Snyder, Shane [Argonne National Lab. (ANL), Argonne, IL (United States); Harms, Kevin [Argonne National Lab. (ANL), Argonne, IL (United States); Nault, Zachary [Argonne National Lab. (ANL), Argonne, IL (United States); Carns, Philip [Argonne National Lab. (ANL), Argonne, IL (United States)

    2017-11-12

    I/O efficiency is essential to productivity in scientific computing, especially as many scientific domains become more data-intensive. Many characterization tools have been used to elucidate specific aspects of parallel I/O performance, but analyzing components of complex I/O subsystems in isolation fails to provide insight into critical questions: how do the I/O components interact, what are reasonable expectations for application performance, and what are the underlying causes of I/O performance problems? To address these questions while capitalizing on existing component-level characterization tools, we propose an approach that combines on-demand, modular synthesis of I/O characterization data into a unified monitoring and metrics interface (UMAMI) to provide a normalized, holistic view of I/O behavior. We evaluate the feasibility of this approach by applying it to a month-long benchmarking study on two distinct largescale computing platforms. We present three case studies that highlight the importance of analyzing application I/O performance in context with both contemporaneous and historical component metrics, and we provide new insights into the factors affecting I/O performance. By demonstrating the generality of our approach, we lay the groundwork for a production-grade framework for holistic I/O analysis.

  13. Towards Blockchain-based Auditable Storage and Sharing of IoT Data

    OpenAIRE

    Shafagh, Hossein; Burkhalter, Lukas; Hithnawi, Anwar; Duquennoy, Simon

    2017-01-01

    Today the cloud plays a central role in storing, processing, and distributing data. Despite contributing to the rapid development of IoT applications, the current IoT cloud-centric architecture has led into a myriad of isolated data silos that hinders the full potential of holistic data-driven analytics within the IoT. In this paper, we present a blockchain-based design for the IoT that brings a distributed access control and data management. We depart from the current trust model that delega...

  14. Professional iOS database application programming

    CERN Document Server

    Alessi, Patrick

    2013-01-01

    Updated and revised coverage that includes the latest versions of iOS and Xcode Whether you're a novice or experienced developer, you will want to dive into this updated resource on database application programming for the iPhone and iPad. Packed with more than 50 percent new and revised material - including completely rebuilt code, screenshots, and full coverage of new features pertaining to database programming and enterprise integration in iOS 6 - this must-have book intends to continue the precedent set by the previous edition by helping thousands of developers master database

  15. Layout-Aware I/O Scheduling for Terabits Data Movement

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Youngjae [ORNL; Atchley, Scott [ORNL; Vallee, Geoffroy R [ORNL; Shipman, Galen M [ORNL

    2013-01-01

    Many science facilities, such as the Department of Energy s Leadership Computing Facilities and experimental facilities including the Spallation Neutron Source, Stanford Linear Accelerator Center, and Advanced Photon Source, produce massive amounts of experimental and simulation data. These data are often shared among the facilities and with collaborating institutions. Moving large datasets over the wide- area network (WAN) is a major problem inhibiting collaboration. Next- generation, terabit-networks will help alleviate the problem, however, the parallel storage systems on the end-system hosts at these institutions can become a bottleneck for terabit data movement. The parallel storage system (PFS) is shared by simulation systems, experimental systems, analysis and visualization clusters, in addition to wide-area data movers. These competing uses often induce temporary, but significant, I/O load imbalances on the storage system, which impact the performance of all the users. The problem is a serious concern because some resources are more expensive (e.g. super computers) or have time-critical deadlines (e.g. experimental data from a light source), but parallel file systems handle all requests fairly even if some storage servers are under heavy load. This paper investigates the problem of competing workloads accessing the parallel file system and how the performance of wide-area data movement can be improved in these environments. First, we study the I/O load imbalance problems using actual I/O performance data collected from the Spider storage system at the Oak Ridge Leadership Computing Facility. Second, we present I/O optimization solutions with layout-awareness on end-system hosts for bulk data movement. With our evaluation, we show that our I/O optimization techniques can avoid the I/O congested disk groups, improving storage I/O times on parallel storage systems for terabit data movement.

  16. Using a 2D Model of the Io Plasma Torus to Investigate the Effects of Density Variations on the Morphology and Intensity of the Io Footprint

    Science.gov (United States)

    Payan, A. P.; Rajendar, A.; Paty, C. S.; Bonfond, B.; Crary, F.

    2012-12-01

    Io is the primary source of plasma in the Jovian magnetosphere, continuously releasing approximately 1 ton/s of SO2 from volcanic eruptions. The interaction of Io with Jupiter's magnetosphere is strongly influenced by the density structure of the resulting plasma torus and the position of Io relative to the center of the torus [Bonfond et al. 2008]. This unusual interaction produces a complex auroral feature on Jupiter's ionosphere known as the Io footprint. Hubble Space Telescope (HST) observations of Jupiter's far-UV aurora during spring 2007 showed an increased number of isolated auroral blobs along with a continuous expansion of Jupiter's main auroral oval over a few months. These blobs were associated with several large injections of hot plasma between 9 and 27 Jovian radii. These events coincided with a large volcanic eruption of the Tvashtar Paterae on Io, as observed by the New Horizons spacecraft [Spencer et al., 2007]. This, in turn, may have resulted in a significant increase in the plasma torus density. Besides, on June 7th, 2007, the Io footprint momentarily became so faint that it disappeared under a diffuse patch of emission remaining from an injection blob [Bonfond et al., 2012]. The goal of the present study is to examine the relationship between the increased density of the plasma torus and the dimming of the Io footprint. We implement a 2D model of the Io plasma torus that treats the variable-density torus as being composed of discrete layers of uniform density. As the co-rotating plasma in the plasma torus impinges on Io, Alfvén waves are launched at a pushback angle obtained from Gurnett and Goertz [1981]. The waves propagate inside the plasma torus through reflection and refraction at density discontinuities where they lose some of their initial energy. Using the above model, we can track the Alfvén wave fronts in the plasma torus and determine the longitude at which they exit the torus along with the corresponding remaining energy. Since

  17. Learning iOS forensics

    CERN Document Server

    Epifani, Mattia

    2015-01-01

    If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

  18. Proceedings First Workshop on Architectures, Languages and Paradigms for IoT

    OpenAIRE

    Pianini, Danilo; Salvaneschi, Guido

    2018-01-01

    The 1st workshop on Architectures, Languages and Paradigms for IoT (ALP4IoT 2017), was held in Turin on September 19th, 2017. ALP4IoT was a satellite event of the 13th International Conference on integrated Formal Methods (iFM 2017). The workshop aimed at critically reviewing the state-of-the-art and the state-of-the-practice of formal techniques and software methods for the IoT, presenting open problems and challenges and triggering a discussion among the participants with different views an...

  19. IoSiS: a radar system for imaging of satellites in space

    Science.gov (United States)

    Jirousek, M.; Anger, S.; Dill, S.; Schreiber, E.; Peichl, M.

    2017-05-01

    Space debris nowadays is one of the main threats for satellite systems especially in low earth orbit (LEO). More than 700,000 debris objects with potential to destroy or damage a satellite are estimated. The effects of an impact often are not identifiable directly from ground. High-resolution radar images are helpful in analyzing a possible damage. Therefor DLR is currently developing a radar system called IoSiS (Imaging of Satellites in Space), being based on an existing steering antenna structure and our multi-purpose high-performance radar system GigaRad for experimental investigations. GigaRad is a multi-channel system operating at X band and using a bandwidth of up to 4.4 GHz in the IoSiS configuration, providing fully separated transmit (TX) and receive (RX) channels, and separated antennas. For the observation of small satellites or space debris a highpower traveling-wave-tube amplifier (TWTA) is mounted close to the TX antenna feed. For the experimental phase IoSiS uses a 9 m TX and a 1 m RX antenna mounted on a common steerable positioner. High-resolution radar images are obtained by using Inverse Synthetic Aperture Radar (ISAR) techniques. The guided tracking of known objects during overpass allows here wide azimuth observation angles. Thus high azimuth resolution comparable to the range resolution can be achieved. This paper outlines technical main characteristics of the IoSiS radar system including the basic setup of the antenna, the radar instrument with the RF error correction, and the measurement strategy. Also a short description about a simulation tool for the whole instrument and expected images is shown.

  20. A post-Galileo view of Io's interior

    Science.gov (United States)

    Keszthelyi, L.; Jaeger, W.L.; Turtle, E.P.; Milazzo, M.; Radebaugh, J.

    2004-01-01

    We present a self-consistent model for the interior of Io, taking the recent Galileo data into account. In this model, Io has a completely molten core, substantially molten mantle, and a very cold lithosphere. Heat from magmatic activity can mobilize volatile compounds such as SO2 in the lithosphere, and the movement of such cryogenic fluids may be important in the formation of surface features including sapping scarps and paterae. ?? Published by Elsevier Inc.

  1. SMART-ITEM: IoT-Enabled Smart Living

    OpenAIRE

    Kor, A; Pattinson, C; Yanovsky, M; Kharchenko, V

    2017-01-01

    The main goal of this proposed project is to harness the emerging IoT technology to empower elderly population to self-manage their own health, stay active, healthy, and independent as long as possible within a smart and secured living environment. An integrated open-sourced IoT ecosystem will be developed. It will encompass the entire data lifecycle which involves the following processes: data acquisition, data transportation; data integration, processing, manipulation and computation; visua...

  2. Seedbed based on IoT: A Case Study

    Directory of Open Access Journals (Sweden)

    J. Kalathas

    2016-05-01

    Full Text Available Nowadays, the Wireless Sensors Network (WSN and the Internet of Things (IOT are widely used in providing decision support systems which solve many problems in the real-world. This paper presents IoT as the best way to solve the agricultural problems, related to seedbed resources optimization, decision making support and seed breeding monitoring. This case study provides real-time information about the seedbed that will help agriculturists make the right decisions during the seed breeding procedure. Using the basic principles of Internet and WSN technology, precision agriculture systems based on the Internet of Things (IoT technology are explained in detail, especially in network architecture, hardware architecture and software process control of the precision seed breeding monitoring system. The implemented automation system monitors data from the sensors in a feedback loop which activates the control devices based on threshold value. The implementation of WSN in seedbed monitoring (SM will optimize the control of air temperature and humidity, soil humidity, air capacity, luminance while it will minimize the time of seed breeding and it will also maximize the number of seeds which become plants ready for transplantation.

  3. Analysis of DDoS-capable IoT malwares

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2017-01-01

    to the top Distributed Denial of Service (DDoS) attacks, making them more powerful and easier to achieve than ever. This paper aims at provide an up-to-date picture of DDoS attacks in the specific subject of the IoT, studying how these attacks work and considering the most common families in the IoT context...

  4. Understanding the I/O Performance Gap Between Cori KNL and Haswell

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Jialin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Koziol, Quincey [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Tang, Houjun [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Tessier, Francois [Argonne National Lab. (ANL), Argonne, IL (United States); Bhimji, Wahid [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Cook, Brandon [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Austin, Brian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Byna, Suren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thakur, Bhupender [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Lockwood, Glenn [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Deslippe, Jack [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Prabhat, None [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC)

    2017-05-01

    The Cori system at NERSC has two compute partitions with different CPU architectures: a 2,004 node Haswell partition and a 9,688 node KNL partition, which ranked as the 5th most powerful and fastest supercomputer on the November 2016 Top 500 list. The compute partitions share a common storage configuration, and understanding the IO performance gap between them is important, impacting not only to NERSC/LBNL users and other national labs, but also to the relevant hardware vendors and software developers. In this paper, we have analyzed performance of single core and single node IO comprehensively on the Haswell and KNL partitions, and have discovered the major bottlenecks, which include CPU frequencies and memory copy performance. We have also extended our performance tests to multi-node IO and revealed the IO cost difference caused by network latency, buffer size, and communication cost. Overall, we have developed a strong understanding of the IO gap between Haswell and KNL nodes and the lessons learned from this exploration will guide us in designing optimal IO solutions in many-core era.

  5. IO and OI. II

    DEFF Research Database (Denmark)

    Engelfriet, Joost; Schmidt, Erik Meineche

    1978-01-01

    In Part 1 of this paper (J. Comput. System Sci. 15, Number 3 (1977)) we presented a fixed point characterization of the (IO and OI) context-free tree languages. We showed that a context-free tree grammar can be viewed as a system of regular equations over a tree language substitution algebra. In ....... In this part we shall use these results to obtain a theory of systems of context-free equations over arbitrary continuous algebras. We refer to the Introduction of Part 1 for a description of the contents of this part.......In Part 1 of this paper (J. Comput. System Sci. 15, Number 3 (1977)) we presented a fixed point characterization of the (IO and OI) context-free tree languages. We showed that a context-free tree grammar can be viewed as a system of regular equations over a tree language substitution algebra...

  6. Hubble Captures Volcanic Eruption Plume From Io

    Science.gov (United States)

    1997-01-01

    The Hubble Space Telescope has snapped a picture of a 400-km-high (250-mile-high) plume of gas and dust from a volcanic eruption on Io, Jupiter's large innermost moon.Io was passing in front of Jupiter when this image was taken by the Wide Field and Planetary Camera 2 in July 1996. The plume appears as an orange patch just off the edge of Io in the eight o'clock position, against the blue background of Jupiter's clouds. Io's volcanic eruptions blasts material hundreds of kilometers into space in giant plumes of gas and dust. In this image, material must have been blown out of the volcano at more than 2,000 mph to form a plume of this size, which is the largest yet seen on Io.Until now, these plumes have only been seen by spacecraft near Jupiter, and their detection from the Earth-orbiting Hubble Space Telescope opens up new opportunities for long-term studies of these remarkable phenomena.The plume seen here is from Pele, one of Io's most powerful volcanos. Pele's eruptions have been seen before. In March 1979, the Voyager 1 spacecraft recorded a 300-km-high eruption cloud from Pele. But the volcano was inactive when the Voyager 2 spacecraft flew by Jupiter in July 1979. This Hubble observation is the first glimpse of a Pele eruption plume since the Voyager expeditions.Io's volcanic plumes are much taller than those produced by terrestrial volcanos because of a combination of factors. The moon's thin atmosphere offers no resistance to the expanding volcanic gases; its weak gravity (one-sixth that of Earth) allows material to climb higher before falling; and its biggest volcanos are more powerful than most of Earth's volcanos.This image is a contrast-enhanced composite of an ultraviolet image (2600 Angstrom wavelength), shown in blue, and a violet image (4100 Angstrom wavelength), shown in orange. The orange color probably occurs because of the absorption and/or scattering of ultraviolet light in the plume. This light from Jupiter passes through the plume and is

  7. ATLAS I/O Performance Optimization in As-Deployed Environments

    CERN Document Server

    Maier, Thomas; The ATLAS collaboration; Bhimji, Wahid; Elmsheuser, Johannes; van Gemmeren, Peter; Malon, David; Krumnack, Nils

    2015-01-01

    I/O is a fundamental determinant in the overall performance of physics analysis and other data-intensive scientific computing. It is, further, crucial to effective resource delivery by the facilities and infrastructure that support data-intensive science. To understand I/O performance, clean measurements in controlled environments are essential, but effective optimization requires as well an understanding of the complicated realities of as-deployed environments. These include a spectrum of local and wide-area data delivery and resilience models, heterogeneous storage systems, matches and mismatches between data organization and access patterns, multi-user considerations that may help or hinder individual job performance, and more. The ATLAS experiment has organized an interdisciplinary working group of I/O, persistence, analysis framework, distributed infrastructure, site deployment, and external experts to understand and improve I/O performance in preparation for Run 2 of the Large Hadron Collider. The adopt...

  8. Volcanism on Io: The Galileo NIMS Io Thermal Emission Database (NITED)

    Science.gov (United States)

    Davies, A. G.; Veeder, G. J.; Matson, D. L.; Johnson, T. V.

    2011-12-01

    In order to determine the magnitude of thermal emission from Io's volcanoes and variability with time at local, regional and global scales, we have calculated the 4.7 or 5 μm radiant flux for every hot spot in every Galileo Near Infrared Mapping Spectrometer (NIMS) observation obtained during the Galileo mission between June 1996 and October 2001. The resulting database contains over 1000 measurements of radiant flux, corrected for emission angle, range to target, and, where necessary, incident sunlight. Io's volcanoes produce the most voluminous and most powerful eruptions in the Solar System [1] and NIMS was the ideal instrument for measuring thermal emission from these volcanoes (see [1, 2]). NIMS covered the infrared from 0.7 to 5.2 μm, so measurement of hot spot thermal emission at ~5 μm was possible even in daytime observations. As part of a campaign to quantify magnitude and variability of volcanic thermal emission [1, 3-5] we examined the entire NIMS dataset (196 observations). The resulting NIMS Io Thermal Emission Database (NITED) allows the charting of 5-μm thermal emission at individual volcanoes, identifying individual eruption episodes, and enabling the comparison of activity at different hot spots [e.g., 6] and different regions of Io. Some ionian hot spots were detected only once or twice by NIMS (e.g., Ah Peku Patera, seen during I32), but most were detected many times (e.g., Culann, Tupan and Zamama, [6]). For example, the database contains over 40 observations of Loki Patera (some at high emission angle, and two partial observations). There are 55 observations of Pele. The 27 nighttime observations of Pele show a remarkably steady 5-μm radiant flux of 35 ± 12 GW/μm. There are 34 observations of Pillan, which erupted violently in 1997. Although in many observations low spatial resolution makes it difficult to separate hot spot pairs such as Susanoo Patera and Mulungu Patera; Tawhaki Patera and Hi'iaka Patera; and Janus Patera and Kanehekili

  9. Proof of Concept of Home IoT Connected Vehicles

    Science.gov (United States)

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-01-01

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the concept of a home IoT connected vehicle with a voice-based virtual personal assistant comprised of a vehicle agent and a home agent. The proposed concept is evaluated by implementing a smartphone linked with home IoT devices that are connected to an infotainment system for the vehicle, a smartphone-based natural language interface input device, and cloud-based home IoT devices for the home. The home-to-vehicle connected service scenarios that aim to reduce the inconvenience due to simple and repetitive tasks by improving the urban mobility efficiency in IoT environments are substantiated by analyzing real vehicle testing and lifestyle research. Remarkable benefits are derived by making repetitive routine tasks one task that is executed by a command and by executing essential tasks automatically, without any request. However, it should be used with authorized permission, applied without any error at the right time, and applied under limited conditions to sense the habitants’ intention correctly and to gain the required trust regarding the remote execution of tasks. PMID:28587246

  10. Proof of Concept of Home IoT Connected Vehicles.

    Science.gov (United States)

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-06-05

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the concept of a home IoT connected vehicle with a voice-based virtual personal assistant comprised of a vehicle agent and a home agent. The proposed concept is evaluated by implementing a smartphone linked with home IoT devices that are connected to an infotainment system for the vehicle, a smartphone-based natural language interface input device, and cloud-based home IoT devices for the home. The home-to-vehicle connected service scenarios that aim to reduce the inconvenience due to simple and repetitive tasks by improving the urban mobility efficiency in IoT environments are substantiated by analyzing real vehicle testing and lifestyle research. Remarkable benefits are derived by making repetitive routine tasks one task that is executed by a command and by executing essential tasks automatically, without any request. However, it should be used with authorized permission, applied without any error at the right time, and applied under limited conditions to sense the habitants' intention correctly and to gain the required trust regarding the remote execution of tasks.

  11. Service framework for Internet of People, Things and Services (IoPTS)

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2016-01-01

    Internet of Things (IoT) is a revolutionary technology, where devices around us will be capable of sensing, reacting, responding and working autonomously to provide services to the users e.g. within smart homes, enterprises, utilities and e-Health. In the IoT paradigm, every device...... will be connected to the Internet to provide services to the user. Bringing this together makes it relevant to talk about the "Internet of People, Things and Services (IoPTS)". However, providing the appropriate services to the users depending on their requirements is a major challenge for IoPTS. After reviewing...

  12. Supporting Analysis and Audit of Collaborative OAIS’s by use of an Outer OAIS – Inner OAIS (OO-IO) Model

    DEFF Research Database (Denmark)

    Zierau, Eld; McGovern, Nancy

    2014-01-01

    the known threats to digital content through time. The main purpose of the paper is to present an Outer OAIS-Inner OAIS (OO-IO) Model that can support the analysis and audit of collaborative interactions between multiple OAIS’s to enable distributed digital preservation. The paper provides extensive...... explanations and diagrams to demonstrate the ability of the OO-IO model to address distributed digital preservation conformance with the Open Archival Information System (OAIS) Reference Model. It is argued that the OO-IO model contributes a necessary extension to the literature of the digital preservation...... community to address the analysis and audit necessary for distributed digital preservation....

  13. NIMS: hotspots on Io during G2

    Science.gov (United States)

    1996-01-01

    The Near Infrared Mapping Spectrometer (NIMS) on the Galileo spacecraft imaged Io at high spectral resolution at a range of 439,000 km (275,000 miles) during the G2 encounter on 7 September 1996. This image shows (on the right) Io as seen in the infrared by NIMS. The image on the left shows the same view from Voyager in 1979. This NIMS image can be compared to the NIMS images from the G1 orbit (June 1996) to monitor changes on Io. The NIMS image is at 4.9 microns, showing thermal emissions from the hotspots. The brightness of the pixels is a function of size and temperature.At least 10 hotspots have been identified and can be matched with surface features. An accurate determination of the position of the hotspot in the vicinity of Shamash Patera is pending. Hotspots are seen in the vicinity of Prometheus, Volund and Marduk, all sites of volcanic plume activity during the Galileo encounters, and also of active plumes in 1979. Temperatures and areas have been calculated for the hotspots shown. Temperatures range from 828 K (1031 F) to 210 K (- 81.4 F). The lowest temperature is significantly higher than the Io background (non-hotspot) surface temperature of about 100 K (-279 F). Hotspot areas range from 6.5 square km (2.5 sq miles) to 40,000 sq km (15,400 sq miles). The hottest hotspots have smallest areas, and the cooler hotspots have the largest areas. NIMS is continuing to observe Io to monitor volcanic activity throughout the Galileo mission.The Galileo mission is managed by the Jet Propulsion Laboratory for NASA's Office of Space Science, Washington, D.C.This image and other images and data received from Galileo are posted on the Galileo mission home page on the World Wide Web at http://galileo.jpl.nasa.gov.

  14. An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jin-Xin Hu

    2017-01-01

    Full Text Available Internet of Things (IoT is the network of physical objects where information and communication technology connect multiple embedded devices to the Internet for collecting and exchanging data. An important advancement is the ability to connect such devices to large resource pools such as cloud. The integration of embedded devices and cloud servers offers wide applicability of IoT to many areas of our life. With the aging population increasing every day, embedded devices with cloud server can provide the elderly with more flexible service without the need to visit hospitals. Despite the advantages of the sensor-cloud model, it still has various security threats. Therefore, the design and integration of security issues, like authentication and data confidentiality for ensuring the elderly’s privacy, need to be taken into consideration. In this paper, an intelligent and secure health monitoring scheme using IoT sensor based on cloud computing and cryptography is proposed. The proposed scheme achieves authentication and provides essential security requirements.

  15. Design of an IoT Enabled Local Network Based Home Monitoring System with a Priority Scheme

    Directory of Open Access Journals (Sweden)

    V. Tiwari

    2017-04-01

    Full Text Available Internet of things (IoT is a concept where all devices get connected to the internet to exchange information. IoT can be utilized in order to make a home environment interactive and smart. The required connectivity can be provided by either making all the devices Wi-Fi capable, which is costly, or by setting a local wireless sensor network (WSN which later connects to internet. In this work various devices and sensors are designed and connected in a wireless sensor network within a home environment which generates a sensor dependent data packet. These data packets are then sent to the cloud through a master node. The master sends the data using a proposed priority scheme so that the critical information can be sent early. Simulations were performed to show that under the proposed scheme the loss of critical sensors information is reduced by around 75%.

  16. Intra-operative parathyroid hormone measurements – experience of ...

    African Journals Online (AJOL)

    Background. Surgery is the treatment of choice for symptomatic primary hyperparathyroidism. The majority of research concerning intra-operative parathyroid hormone (ioPTH) measurements is conducted in university hospitals. Whether ioPTH measurements are feasible and useful in predicting the presence of remaining ...

  17. Developing an M-Learning Application for iOS

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2013-01-01

    Full Text Available The mobile market development has a high impact on all domains including education. Smart mobile devices started to be affordable and the massive use on educational processes does not seem to be too far. Mobile learning applications are be targeted for all major mobile operating systems as native applications or Web-based. The objective of this paper is to present the implementation of the evaluation module for an m-learning application developed for iOS devices. The m-learning application is targeted to a higher education institution. The application uses Web services in order to obtain the content and to authenticate the users.

  18. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    Directory of Open Access Journals (Sweden)

    Ming Luo

    2018-01-01

    Full Text Available Nowadays wireless sensor network (WSN is increasingly being used in the Internet of Things (IoT for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cross-domain IoT environment in practical situations. To solve this shortcoming, we propose a more secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the Internet of Things, which allows an Internet user in a certificateless cryptography (CLC environment to communicate with a sensor node in an identity-based cryptography (IBC environment with different system parameters. Moreover, our proposed scheme achieves known session-specific temporary information security (KSSTIS that most of access control schemes cannot satisfy. Performance analysis is given to show that our scheme is well suited for wireless sensor networks in the cross-domain context of the IoT.

  19. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications.

    Science.gov (United States)

    Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-12-24

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  20. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Directory of Open Access Journals (Sweden)

    Tiago M. Fernández-Caramés

    2016-12-01

    Full Text Available The Internet of Things (IoT is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification, which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3 to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  1. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Science.gov (United States)

    Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-01-01

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119

  2. Attack tree analysis for insider threats on the IoT using isabelle

    DEFF Research Database (Denmark)

    Kammüller, Florian; Nurse, Jason R. C.; Probst, Christian W.

    2016-01-01

    The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human insiders in "regular" organisations is real; in a fully-connected world of the IoT, organisations face a substantially more severe security challenge due to unexpected access possibilities and info....... On the classified IoT attack examples, we show how this logical approach can be used to make the models more precise and to analyse the previously identified Insider IoT attacks using Isabelle attack trees....

  3. Internet of Things : a gateway centric solution for providing IoT connectivity

    OpenAIRE

    Karhula, Pekka

    2016-01-01

    The Internet of Things (IoT) is revolutionising the traditional Internet by extending it with smart everyday objects. Wearables, smart grids and home automation systems are just a few examples of the IoT. A noteworthy point is that the amount of devices connected to the Internet will rapidly grow with the IoT. The IoT typically involves devices that are constrained in terms of energy, memory and processing resources. Therefore, they also limit applying the existing Internet pro...

  4. Network Function Virtualization (NFV) based architecture to address connectivity, interoperability and manageability challenges in Internet of Things (IoT)

    Science.gov (United States)

    Haseeb, Shariq; Hashim, Aisha Hassan A.; Khalifa, Othman O.; Faris Ismail, Ahmad

    2017-11-01

    IoT aims to interconnect sensors and actuators built into devices (also known as Things) in order for them to share data and control each other to improve existing processes for making people’s life better. IoT aims to connect between all physical devices like fridges, cars, utilities, buildings and cities so that they can take advantage of small pieces of information collected by each one of these devices and derive more complex decisions. However, these devices are heterogeneous in nature because of various vendor support, connectivity options and protocol suit. Heterogeneity of such devices makes it difficult for them to leverage on each other’s capabilities in the traditional IoT architecture. This paper highlights the effects of heterogeneity challenges on connectivity, interoperability, management in greater details. It also surveys some of the existing solutions adopted in the core network to solve the challenges of massive IoT deployments. Finally, the paper proposes a new architecture based on NFV to address the problems.

  5. Aplikasi Keliling Nusantara Edisi Sumatera Berbasis Android dan iOS

    Directory of Open Access Journals (Sweden)

    Angga Apridianto

    2015-08-01

    Full Text Available Diversity of art and culture in Indonesia should be preserved so as not to become extinct in the face of times so that it can be passed on to generations to come. Many of the people of Indonesia who forget about the culture to identity of the area because of several factors such as the people of indonesia more interested of the western culture than self culture, the region of Indonesia which large also cause people’s reluctance to learn because of constrained of time, distance and cost as well as limitations of the media information about the art and culture that currently can only be learned through pictures and visit the location of art and culture directly make the introduction of art and culture to people of indonesia not yet optimal. Therefore required a media so that people can learn more about the wealth of art and culture without having to visit directly into the location of the arts and cultures its. “Keliling Nusantara Edisi Sumatra” application that was built can be the way to preserve the national culture. The function of this application as a learning media for recognize the diversity of arts and cultures of Indonesia on the island of Sumatra. This application is built using Mobione Studio and running on Android and iOS devices. The application is made using the UCD (User Centered Design which has been mapped to multimedia development methods by Luther from the stage specify the context of use and specify the users and organisational requirements are mapped into the concept, the stage produce design solutions are mapped into the design, production and collecting material as wellas the evaluate design againts the user requirements are mapped into the stage of testing and distribution. The results produced an application based on Android and iOS contains folks song and lyrics and sound, traditional dress, traditional homes, custom traditions, traditional weapons, traditional dance, tradition musical instrument, the symbol of the

  6. NIMS: hotspots on Io during G2 (continued)

    Science.gov (United States)

    1997-01-01

    This is another Near Infrared Mapping Spectrometer (NIMS) image of Io, taken during the G2 encounter in September 1996. This is a dayside image of Io (on the right) against the clouds of Jupiter (the blue background). On the left is a Voyager mosaic of Io with the same viewing geometry for comparison purposes. This NIMS data set has been processed to highlight the positions of hot spots on the surface of Io. At least 11 can be seen. Two of the hotspots are newly discovered by the NIMS instrument. Others correspond to sites of plume eruptions and volcanic calderas and volcanic flows. This image can be compared with the SSI image P-47971 released on October 23, 1996, which was taken almost exactly the same position.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov.

  7. A Multi-Hop Clustering Mechanism for Scalable IoT Networks.

    Science.gov (United States)

    Sung, Yoonyoung; Lee, Sookyoung; Lee, Meejeong

    2018-03-23

    It is expected that up to 26 billion Internet of Things (IoT) equipped with sensors and wireless communication capabilities will be connected to the Internet by 2020 for various purposes. With a large scale IoT network, having each node connected to the Internet with an individual connection may face serious scalability issues. The scalability problem of the IoT network may be alleviated by grouping the nodes of the IoT network into clusters and having a representative node in each cluster connect to the Internet on behalf of the other nodes in the cluster instead of having a per-node Internet connection and communication. In this paper, we propose a multi-hop clustering mechanism for IoT networks to minimize the number of required Internet connections. Specifically, the objective of proposed mechanism is to select the minimum number of coordinators, which take the role of a representative node for the cluster, i.e., having the Internet connection on behalf of the rest of the nodes in the cluster and to map a partition of the IoT nodes onto the selected set of coordinators to minimize the total distance between the nodes and their respective coordinator under a certain constraint in terms of maximum hop count between the IoT nodes and their respective coordinator. Since this problem can be mapped into a set cover problem which is known as NP-hard, we pursue a heuristic approach to solve the problem and analyze the complexity of the proposed solution. Through a set of experiments with varying parameters, the proposed scheme shows 63-87.3% reduction of the Internet connections depending on the number of the IoT nodes while that of the optimal solution is 65.6-89.9% in a small scale network. Moreover, it is shown that the performance characteristics of the proposed mechanism coincide with expected performance characteristics of the optimal solution in a large-scale network.

  8. Sensor-Based Optimization Model for Air Quality Improvement in Home IoT.

    Science.gov (United States)

    Kim, Jonghyuk; Hwangbo, Hyunwoo

    2018-03-23

    We introduce current home Internet of Things (IoT) technology and present research on its various forms and applications in real life. In addition, we describe IoT marketing strategies as well as specific modeling techniques for improving air quality, a key home IoT service. To this end, we summarize the latest research on sensor-based home IoT, studies on indoor air quality, and technical studies on random data generation. In addition, we develop an air quality improvement model that can be readily applied to the market by acquiring initial analytical data and building infrastructures using spectrum/density analysis and the natural cubic spline method. Accordingly, we generate related data based on user behavioral values. We integrate the logic into the existing home IoT system to enable users to easily access the system through the Web or mobile applications. We expect that the present introduction of a practical marketing application method will contribute to enhancing the expansion of the home IoT market.

  9. How to act strategically in a turbulent e-business environment - an eclectic approach to strategic inter-organisational systems (IOS) management

    OpenAIRE

    Wassenaar, Arjen

    2002-01-01

    This paper presents an eclectic inter-organisational -oriented approach to so called strategic IOS management as an alternative to the more single organisation-oriented, linear approach of strategic information system planning (SISP). This approach is termed eclectic because it is based on a toolbox of mini-theories integrating existing strategic (IS) planning a n d management theories. The core component of this approach is an IOS scenario and strategic option generator"...

  10. A survey on LPWA technology: LoRa and NB-IoT

    Directory of Open Access Journals (Sweden)

    Rashmi Sharan Sinha

    2017-03-01

    Full Text Available By 2020, more than twenty five billion devices would be connected through wireless communications. In accordance with the rapid growth of the internet of things (IoT market, low power wide area (LPWA technologies have become popular. In various LPWA technologies, narrowband (NB-IoT and long range (LoRa are two leading technologies. In this paper, we provide a comprehensive survey on NB-IoT and LoRa as efficient solutions connecting the devices. It is shown that unlicensed LoRa has advantages in terms of battery lifetime, capacity, and cost. Meanwhile, licensed NB-IoT offers benefits in terms of QoS, latency, reliability, and range.

  11. Tractable policy management framework for IoT

    Science.gov (United States)

    Goynugur, Emre; de Mel, Geeth; Sensoy, Murat; Calo, Seraphin

    2017-05-01

    Due to the advancement in the technology, hype of connected devices (hence forth referred to as IoT) in support of automating the functionality of many domains, be it intelligent manufacturing or smart homes, have become a reality. However, with the proliferation of such connected and interconnected devices, efficiently and effectively managing networks manually becomes an impractical, if not an impossible task. This is because devices have their own obligations and prohibitions in context, and humans are not equip to maintain a bird's-eye-view of the state. Traditionally, policies are used to address the issue, but in the IoT arena, one requires a policy framework in which the language can provide sufficient amount of expressiveness along with efficient reasoning procedures to automate the management. In this work we present our initial work into creating a scalable knowledge-based policy framework for IoT and demonstrate its applicability through a smart home application.

  12. Integrating Facebook iOS SDK with your application

    CERN Document Server

    Macrì, Giuseppe

    2013-01-01

    A tutorial-based guide with chapters focusing on learning and embedding crucial Facebook features.If you are a developer who wishes to develop and monetize your apps on the App store, then this is the book for you. This book assumes you have basic knowledge of iOS programming using Objective-C and XCode, however, prior knowledge of Facebook iOS SDK is not required.

  13. Object‐Oriented RFID with IoT: A Design Concept of  Information Systems in Manufacturing

    Directory of Open Access Journals (Sweden)

    Tamotsu Kamigaki

    2017-02-01

    Full Text Available The Internet of Things (IoT has increasingly become important in industry. Connectivity  over the internet of not only people but also devices (such as sensors, appliances, machines, robots,  and vehicles is leading to a paradigm shift in manufacturing. The Japanese government recognizes  this and has stated that IoT connectivity and the methodologies to exploit it are paramount for  Japanese  industry.  Currently,  the  necessary  changes  have  been  realized  in  large  Japanese  companies;  however,  implementation  in  smaller  companies  has  been  lagging,  despite  the  advantages of introducing IoT technologies, due to the high cost. The objective of this research is to  suggest a design concept which combines IoT and object‐oriented radio frequency identification  (RFID.  IoT technology is  used for  collecting, analyzing, and managing data, and an object‐oriented  RFID  system  is used  as a control  process in manufacturing  systems.  In previous research,  the objectoriented  RFID system  was shown to provide  flexible management through the use of a variety of  OORFID tags. The current research extends this by introducing object‐oriented RFID into IoT  systems to  improve  the  flexibility  in the  manufacturing systems. For the verification of this concept,  an experimental IoT system using object‐oriented  RFID was  designed  and  implemented

  14. Instant Passbook app development for iOS how-to

    CERN Document Server

    Moon, Keith D

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. A step-by-step guide, focusing on simple projects to help you create a Passbook app for iOS 6.Instant Passbook App Development for iOS 6 How-to is for registered Apple iOS developers, experienced in building an app using Objective-C and Xcode, looking to add Passbook functionality to their app. You will need to have an understanding of the JSON format, REST APIs, and a server-side language like Ruby. Familiarity with executing commands via the Terminal app is expected for the exerci

  15. Latitudinal oscillations of plasma within the Io torus

    Science.gov (United States)

    Cummings, W. D.; Dessler, A. J.; Hill, T. W.

    1980-01-01

    The equilibrium latitude and the period of oscillations about this equilibrium latitude are calculated for a plasma in a centrifugally dominated tilted dipole magnetic field representing Jupiter's inner magnetosphere. It is found that for a hot plasma the equilibrium latitude in the magnetic equator, for a cold plasma it is the centrifugal equator, and for a warm plasma it is somewhere in between. An illustrative model is adopted in which atoms are sputtered from the Jupiter-facing hemisphere of Io and escape Io's gravity to be subsequently ionized some distance from Io. Finally, it is shown that ionization generally does not occur at the equilibrium altitude, and that the resulting latitudinal oscillations provide an explanation for the irregularities in electron concentration within the torus, as reported by the radioastronomy experiment aboard Voyager I.

  16. IoT-Based Car's Parking Monitoring System

    OpenAIRE

    Dwiputra Albertus Ega; Khoswanto Handry; Sutjiadi Raymond; Lim Resmana

    2018-01-01

    Internet-of-things-based technologies have advanced so much and helped public necessities. The use of IoT at a parking lot will help vehicle users to know the availability of a parking location through smartphones. This IoT-based parking system is created by using controllers, sensors, servers and cloud. Controllers and sensors will be placed on the ceiling of each parking slots to detect the presence of a car. Server collect the results of the sensors and store them in Cloud. System test is ...

  17. I/O load balancing for big data HPC applications

    Energy Technology Data Exchange (ETDEWEB)

    Paul, Arnab K. [Virginia Polytechnic Institute and State University; Goyal, Arpit [Virginia Polytechnic Institute and State University; Wang, Feiyi [ORNL; Oral, H Sarp [ORNL; Butt, Ali R. [Virginia Tech, Blacksburg, VA; Brim, Michael J. [ORNL; Srinivasa, Sangeetha B. [Virginia Polytechnic Institute and State University

    2018-01-01

    High Performance Computing (HPC) big data problems require efficient distributed storage systems. However, at scale, such storage systems often experience load imbalance and resource contention due to two factors: the bursty nature of scientific application I/O; and the complex I/O path that is without centralized arbitration and control. For example, the extant Lustre parallel file system-that supports many HPC centers-comprises numerous components connected via custom network topologies, and serves varying demands of a large number of users and applications. Consequently, some storage servers can be more loaded than others, which creates bottlenecks and reduces overall application I/O performance. Existing solutions typically focus on per application load balancing, and thus are not as effective given their lack of a global view of the system. In this paper, we propose a data-driven approach to load balance the I/O servers at scale, targeted at Lustre deployments. To this end, we design a global mapper on Lustre Metadata Server, which gathers runtime statistics from key storage components on the I/O path, and applies Markov chain modeling and a minimum-cost maximum-flow algorithm to decide where data should be placed. Evaluation using a realistic system simulator and a real setup shows that our approach yields better load balancing, which in turn can improve end-to-end performance.

  18. An IoT Based Predictive Connected Car Maintenance Approach

    OpenAIRE

    Rohit Dhall; Vijender Kumar Solanki

    2017-01-01

    Internet of Things (IoT) is fast emerging and becoming an almost basic necessity in general life. The concepts of using technology in our daily life is not new, but with the advancements in technology, the impact of technology in daily activities of a person can be seen in almost all the aspects of life. Today, all aspects of our daily life, be it health of a person, his location, movement, etc. can be monitored and analyzed using information captured from various connected devices. This pape...

  19. Dynamic Data Driven Operator Error Early Warning System

    Science.gov (United States)

    2015-08-13

    data sources , gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this...after each cognitive activity is captured in an android device which doubles as the server for a wireless body area network (WBAN). Thus the operator...MindWave Mobile (NeuroSky, Inc., USA) will be a possible solution. NeuroSky is a non-invasive EEG that connects the user to iOS and Android platforms

  20. Perancangan Permainan Gelembung Huruf (Tokoh Wayang Berbasis Sistem Operasi iOS Menggunakan Gamesalad

    Directory of Open Access Journals (Sweden)

    Adhitama Ksatriya Nugraha

    2014-01-01

    Full Text Available Currently, the globalization and modernization of the country make us forget the traditional culture. Not surprisingly, more people are not familiar with puppet , let alone moved to preserve it. Therefore, in this era get involved use of mobile devices such as smartphones as the most efficient tool as interactive learning media. Now, the use of smart mobile devices are no longer limited by age, therefore developers will try to exploit this as a media that can be used for interactive learning. Puppets as one of traditional Indonesian art is very typical of Indonesia. Aside from the form or shape, it can be seen also particularities of the story and the character of each puppet characters . Games that are culturally especially puppet is still rare, especially for mobile devices based on its iOS operating system. Thus the authors tried to make a game design that aims to increase knowledge about the names of the puppet characters. Game development tool use to make this game is GameSalad, with object -oriented programming concepts. GameSalad is one of game development tools that game developers can use to facilitate the making of the game for mobile devices based on the iOS operating system. The design phase begins with analysis requirement and system design. Implementation stage is done by building and developing the game in accordance with the draft that has been made, the implementation of the program. The testing phase is done with a black-box method. The results show that this game can run well on mobile devices with the iOS operating system. The buttons and functions on the game also can function properly and in accordance with their respective functionality. Based on the assessment provided by a sample of users, the game "Gelembung Huruf (Tokoh Wayang” is considered attractive, easy to understand and play, able to gain knowledge about the names of the puppet characters, raises curiosity, as well as look good game, so the user's attention to

  1. Main-Memory Operation Buffering for Efficient R-Tree Update

    DEFF Research Database (Denmark)

    Jensen, Christian Søndergaard; Saltenis, Simonas; Biveinis, Laurynas

    2007-01-01

    the buffering of update operations in main memory as well as the grouping of operations to reduce disk I/O. In particular, operations are performed in bulk so that multiple operations are able to share I/O. The paper presents an analytical cost model that is shown to be accurate by empirical studies...... the main memory that is indeed available, or do not support some of the standard index operations. Assuming a setting where the index updates need not be written to disk immediately, we propose an R-tree-based indexing technique that does not exhibit any of these drawbacks. This technique exploits...

  2. Scalable I/O Systems via Node-Local Storage: Approaching 1 TB/sec File I/O

    Energy Technology Data Exchange (ETDEWEB)

    Bronevetsky, G; Moody, A

    2009-08-18

    In the race to PetaFLOP-speed supercomputing systems, the increase in computational capability has been accompanied by corresponding increases in CPU count, total RAM, and storage capacity. However, a proportional increase in storage bandwidth has lagged behind. In order to improve system reliability and to reduce maintenance effort for modern large-scale systems, system designers have opted to remove node-local storage from the compute nodes. Today's multi-TeraFLOP supercomputers are typically attached to parallel file systems that provide only tens of GBs/s of I/O bandwidth. As a result, such machines have access to much less than 1GB/s of I/O bandwidth per TeraFLOP of compute power, which is below the generally accepted limit required for a well-balanced system. In a many ways, the current I/O bottleneck limits the capabilities of modern supercomputers, specifically in terms of limiting their working sets and restricting fault tolerance techniques, which become critical on systems consisting of tens of thousands of components. This paper resolves the dilemma between high performance and high reliability by presenting an alternative system design which makes use of node-local storage to improve aggregate system I/O bandwidth. In this work, we focus on the checkpointing use-case and present an experimental evaluation of the Scalable Checkpoint/Restart (SCR) library, a new adaptive checkpointing library that uses node-local storage to significantly improve the checkpointing performance of large-scale supercomputers. Experiments show that SCR achieves unprecedented write speeds, reaching a measured 700GB/s of aggregate bandwidth on 8,752 processors and an estimated 1TB/s for a similarly structured machine of 12,500 processors. This corresponds to a speedup of over 70x compared to the bandwidth provided by the 10GB/s parallel file system the cluster uses. Further, SCR can adapt to an environment in which there is wide variation in performance or capacity among

  3. Prediction-Based Energy Saving Mechanism in 3GPP NB-IoT Networks.

    Science.gov (United States)

    Lee, Jinseong; Lee, Jaiyong

    2017-09-01

    The current expansion of the Internet of things (IoT) demands improved communication platforms that support a wide area with low energy consumption. The 3rd Generation Partnership Project introduced narrowband IoT (NB-IoT) as IoT communication solutions. NB-IoT devices should be available for over 10 years without requiring a battery replacement. Thus, a low energy consumption is essential for the successful deployment of this technology. Given that a high amount of energy is consumed for radio transmission by the power amplifier, reducing the uplink transmission time is key to ensure a long lifespan of an IoT device. In this paper, we propose a prediction-based energy saving mechanism (PBESM) that is focused on enhanced uplink transmission. The mechanism consists of two parts: first, the network architecture that predicts the uplink packet occurrence through a deep packet inspection; second, an algorithm that predicts the processing delay and pre-assigns radio resources to enhance the scheduling request procedure. In this way, our mechanism reduces the number of random accesses and the energy consumed by radio transmission. Simulation results showed that the energy consumption using the proposed PBESM is reduced by up to 34% in comparison with that in the conventional NB-IoT method.

  4. Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis

    KAUST Repository

    Gharbieh, Mohammad; Elsawy, Hesham; Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, will play fundamental rule in delivering the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ramping. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.

  5. Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis

    KAUST Repository

    Gharbieh, Mohammad

    2017-05-02

    The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, will play fundamental rule in delivering the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ramping. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.

  6. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad; Elsawy, Hesham; Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  7. IoT’s Tiny Steps towards 5G: Telco’s Perspective

    Directory of Open Access Journals (Sweden)

    Enida Cero

    2017-10-01

    Full Text Available The numerous and diverse applications of the Internet of Things (IoT have the potential to change all areas of daily life of individuals, businesses, and society as a whole. The vision of a pervasive IoT spans a wide range of application domains and addresses the enabling technologies needed to meet the performance requirements of various IoT applications. In order to accomplish this vision, this paper aims to provide an analysis of literature in order to propose a new classification of IoT applications, specify and prioritize performance requirements of such IoT application classes, and give an insight into state-of-the-art technologies used to meet these requirements, all from telco’s perspective. A deep and comprehensive understanding of the scope and classification of IoT applications is an essential precondition for determining their performance requirements with the overall goal of defining the enabling technologies towards fifth generation (5G networks, while avoiding over-specification and high costs. Given the fact that this paper presents an overview of current research for the given topic, it also targets the research community and other stakeholders interested in this contemporary and attractive field for the purpose of recognizing research gaps and recommending new research directions.

  8. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad

    2017-02-07

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  9. The Io Volcano Observer (IVO) for NASA Discovery 2015

    Science.gov (United States)

    McEwen, Alfred S.; Turtle, Elizabeth P.; Thomas, Nicolas

    2015-04-01

    IVO was first proposed as a NASA Discovery mission in 2010, powered by the Advanced Sterling Radioisotope Generators (ASRGs) to provide a compact spacecraft that points and settles quickly. The 2015 IVO uses advanced lightweight solar arrays and a 1-dimensional pivot to achieve similar observing flexibility during a set of fast (~18 km/s) flybys of Io. The John Hopkins University Applied Physics Lab (APL) leads mission implementation, with heritage from MESSENGER, New Horizons, and the Van Allen Probes. All science objectives from the Io Observer New Frontiers concept recommended in the 2011 Decadal Survey are addressed by IVO. There are 5 instruments plus gravity science: Narrow- and wide-angle cameras (NAC and WAC), Dual fluxgate magnetometers (DMAG), a thermal mapper (TMAP, from DLR), and particle environment package for Io (PEPI) consisting of an ion and neutral mass spectrometer (INMS, from UBE) and a plasma ion analyzer (PIA, from IRF). A student collaboration hotspot mapper (HOTMAP) is an option. The NAC and TMAP are on a ± 90° pivot for off-nadir targeting during encounters and for distant monitoring. The DMAG sensors are on the end and middle of 3.8-m boom and collect data continuously. WAC and HOTMAP are mounted on the S/C nadir deck, and observe during ±20 minutes of each Io closest approach, except orbits I0 and I2. PEPI is mounted on the S/C structure with the INMS field of view in the ram direction when the S/C nadir deck points at Io, and the PIA and has a large (hemispheric) field of view that will often include the upstream direction. Gravity science requires pointing the high-gain antenna at Earth during the I0 and I2 encounters. IVO launches in 2021 and arrives at Jupiter in early 2026. A close Io flyby (I0) ~1.5 hrs. after Jupiter orbit insertion lowers the orbit period, followed by 8 additional encounters achieving the suite of science objectives. The highly elliptical orbit with perijove near Io is inclined >40° to Jupiter's orbital plane

  10. Sensor-Based Optimization Model for Air Quality Improvement in Home IoT

    Directory of Open Access Journals (Sweden)

    Jonghyuk Kim

    2018-03-01

    Full Text Available We introduce current home Internet of Things (IoT technology and present research on its various forms and applications in real life. In addition, we describe IoT marketing strategies as well as specific modeling techniques for improving air quality, a key home IoT service. To this end, we summarize the latest research on sensor-based home IoT, studies on indoor air quality, and technical studies on random data generation. In addition, we develop an air quality improvement model that can be readily applied to the market by acquiring initial analytical data and building infrastructures using spectrum/density analysis and the natural cubic spline method. Accordingly, we generate related data based on user behavioral values. We integrate the logic into the existing home IoT system to enable users to easily access the system through the Web or mobile applications. We expect that the present introduction of a practical marketing application method will contribute to enhancing the expansion of the home IoT market.

  11. Optimizing mission critical data dissemination in massive IoT networks

    KAUST Repository

    Farooq, Muhammad Junaid; Elsawy, Hesham; Zhu, Quanyan; Alouini, Mohamed-Slim

    2017-01-01

    Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple

  12. Evidence of a global magma ocean in Io's interior.

    Science.gov (United States)

    Khurana, Krishan K; Jia, Xianzhe; Kivelson, Margaret G; Nimmo, Francis; Schubert, Gerald; Russell, Christopher T

    2011-06-03

    Extensive volcanism and high-temperature lavas hint at a global magma reservoir in Io, but no direct evidence has been available. We exploited Jupiter's rotating magnetic field as a sounding signal and show that the magnetometer data collected by the Galileo spacecraft near Io provide evidence of electromagnetic induction from a global conducting layer. We demonstrate that a completely solid mantle provides insufficient response to explain the magnetometer observations, but a global subsurface magma layer with a thickness of over 50 kilometers and a rock melt fraction of 20% or more is fully consistent with the observations. We also place a stronger upper limit of about 110 nanoteslas (surface equatorial field) on the dynamo dipolar field generated inside Io.

  13. Io's UV-V Eclipse Emission: Implications for Pele-type Plumes

    Science.gov (United States)

    Moore, C. H.; Goldstein, D. B.; Varghese, P. L.; Trafton, L. M.

    2010-03-01

    Simulations of Io's NUV-V emission in eclipse show that S2-rich giant plumes' S2 concentrations and activity levels effect the absolute brightness and the east/west intensity ratio across Io allowing for plume activity to be determined from observed spectra.

  14. Internet of Things (IoT Platform for Structure Health Monitoring

    Directory of Open Access Journals (Sweden)

    Ahmed Abdelgawad

    2017-01-01

    Full Text Available Increase in the demand for reliable structural health information led to the development of Structural Health Monitoring (SHM. Prediction of upcoming accidents and estimation of useful life span of a structure are facilitated through SHM. While data sensing is the core of any SHM, tracking the data anytime anywhere is a prevailing challenge. With the advancement in information technology, the concept of Internet of Things (IoT has made it possible to integrate SHM with Internet to track data anytime anywhere. In this paper, a SHM platform embedded with IoT is proposed to detect the size and location of damage in structures. The proposed platform consists of a Wi-Fi module, a Raspberry Pi, an Analog to Digital Converter (ADC, a Digital to Analog Converter (DAC, a buffer, and piezoelectric (PZT sensors. The piezoelectric sensors are mounted as a pair in the structure. Data collected from the piezoelectric sensors will be used to detect the size and location of damage using a proposed mathematical model. Implemented on a Raspberry Pi, the proposed mathematical model will estimate the size and location of structural damage, if any, and upload the data to Internet. This data will be stored and can be checked remotely from any mobile device. The system has been validated using a real test bed in the lab.

  15. Towards Blockchain-based Auditable Storage and Sharing of IoT Data

    OpenAIRE

    Shafagh , Hossein; Hithnawi , Anwar; Duquennoy , Simon

    2017-01-01

    International audience; Today the cloud plays a central role in storing, processing , and distributing data. Despite contributing to the rapid development of various applications, including the IoT, the current centralized storage architecture has led into a myriad of isolated data silos and is preventing the full potential of holistic data-driven analytics for IoT data. In this abstract, we advocate a data-centric design for IoT with focus on resilience, sharing, and auditable protection of ...

  16. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  17. Proposed Embedded Security Framework for Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Babar, Sachin D.; Stango, Antonietta; Prasad, Neeli R.

    2011-01-01

    IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives...

  18. Pele Plume Deposit on Io

    Science.gov (United States)

    1997-01-01

    The varied effects of Ionian volcanism can be seen in this false color infrared composite image of Io's trailing hemisphere. Low resolution color data from Galileo's first orbit (June, 1996) have been combined with a higher resolution clear filter picture taken on the third orbit (November, 1996) of the spacecraft around Jupiter.A diffuse ring of bright red material encircles Pele, the site of an ongoing, high velocity volcanic eruption. Pele's plume is nearly invisible, except in back-lit photographs, but its deposits indicate energetic ejection of sulfurous materials out to distances more than 600 kilometers from the central vent. Another bright red deposit lies adjacent to Marduk, also a currently active ediface. High temperature hot spots have been detected at both these locations, due to the eruption of molten material in lava flows or lava lakes. Bright red deposits on Io darken and disappear within years or decades of deposition, so the presence of bright red materials marks the sites of recent volcanism.This composite was created from data obtained by the Solid State Imaging (CCD) system aboard NASA's Galileo spacecraft. The region imaged is centered on 15 degrees South, 224 degrees West, and is almost 2400 kilometers across. The finest details that can be discerned in this picture are about 3 kilometers across. North is towards the top of the picture and the sun illuminates the surface from the west.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can be found at URL http://www.jpl.nasa.gov/galileo/sepo

  19. Understanding I/O workload characteristics of a Peta-scale storage system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Youngjae [ORNL; Gunasekaran, Raghul [ORNL

    2015-01-01

    Understanding workload characteristics is critical for optimizing and improving the performance of current systems and software, and architecting new storage systems based on observed workload patterns. In this paper, we characterize the I/O workloads of scientific applications of one of the world s fastest high performance computing (HPC) storage cluster, Spider, at the Oak Ridge Leadership Computing Facility (OLCF). OLCF flagship petascale simulation platform, Titan, and other large HPC clusters, in total over 250 thousands compute cores, depend on Spider for their I/O needs. We characterize the system utilization, the demands of reads and writes, idle time, storage space utilization, and the distribution of read requests to write requests for the Peta-scale Storage Systems. From this study, we develop synthesized workloads, and we show that the read and write I/O bandwidth usage as well as the inter-arrival time of requests can be modeled as a Pareto distribution. We also study the I/O load imbalance problems using I/O performance data collected from the Spider storage system.

  20. Towards IoT platforms’ integration : Semantic Translations between W3C SSN and ETSI SAREF

    NARCIS (Netherlands)

    Moreira, João Luiz; Daniele, L.M.; Ferreira Pires, Luis; van Sinderen, Marten J.; Wasielewska, Katarzyna; Szmeja, Pawel; Pawlowski, Wieslaw; Ganzha, Maria; Paprzycki, Marcin

    2017-01-01

    Several IoT ontologies have been developed lately to improve the semantic interoperability of IoT solutions. The most popular of these ontologies, the W3C Semantic Sensor Network (SSN), is considered an ontological foundation for diverse IoT initiatives, particularly OpenIoT. With characteristics

  1. Realizing IoT service's policy privacy over publish/subscribe-based middleware.

    Science.gov (United States)

    Duan, Li; Zhang, Yang; Chen, Shiping; Wang, Shiyao; Cheng, Bo; Chen, Junliang

    2016-01-01

    The publish/subscribe paradigm makes IoT service collaborations more scalable and flexible, due to the space, time and control decoupling of event producers and consumers. Thus, the paradigm can be used to establish large-scale IoT service communication infrastructures such as Supervisory Control and Data Acquisition systems. However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all the events from the subscribed event type with no choice. Few existing publish/subscribe middleware have built-in mechanisms to address the above issues. In this paper, we present a novel access control framework, which is capable of preserving IoT service's policy privacy. In particular, we adopt the publish/subscribe paradigm as the IoT service communication infrastructure to facilitate the protection of IoT services policy privacy. The key idea in our policy-privacy solution is using a two-layer cooperating method to match bi-directional privacy control requirements: (a) data layer for protecting IoT events; and (b) application layer for preserving the privacy of service policy. Furthermore, the anonymous-set-based principle is adopted to realize the functionalities of the framework, including policy embedding and policy encoding as well as policy matching. Our security analysis shows that the policy privacy framework is Chosen-Plaintext Attack secure. We extend the open source Apache ActiveMQ broker by building into a policy-based authorization mechanism to enforce the privacy policy. The performance evaluation results indicate that our approach is scalable with reasonable overheads.

  2. An IoT-enabled supply chain integration framework : empirical case studies

    OpenAIRE

    Wakenshaw, Susan Y. L.; Maple, Carsten; Chen, Daqiang; Micillo, Rosario

    2017-01-01

    Supply chain integration is crucial for supply chain performance, particularly in industry 4.0. With the proliferation of Internet of Things (IoT) and the use of cyber-physical systems, supply chain integration needs to be greatly enhanced. In this paper, we explore supply integration (process and application) in the supply chain network enabled by IoT. Using the case study method, we investigate technical and business applications of IoT in supply chains and how it can interface with the pro...

  3. A neural network and IoT-based scheme for performance assessment in Internet of Robotic Things

    OpenAIRE

    Razafimandimby , Cristanel; Loscri , Valeria; Vegni , Anna Maria

    2016-01-01

    International audience; Internet of Robotic Things (IoRT) is a new concept introduced for the first time by ABI Research. Unlike the Internet of Things (IoT), IoRT provides an active sensorization and is considered as the new evolution of IoT. This new concept will bring new opportunities and challenges, while providing new business ideas for IoT and robotics’ entrepreneurs. In this paper, we will focus particularly on two issues: (i) connectivity maintenance among multiple IoRT robots, and (...

  4. Uncovering the Images and Meanings of International Organizations (IOs) in Higher Education Research

    Science.gov (United States)

    Shahjahan, Riyad A.; Madden, Meggan

    2015-01-01

    Employing Stuart Hall's concept of representation, we examine how international organizations (IOs) are presented in the higher education literature. This paper examines how IOs, such as the World Bank, OECD, and UNESCO, are conceptualized and represented by higher education researchers. We focus on three main representations of IOs in the higher…

  5. BIM and IoT: A Synopsis from GIS Perspective

    Science.gov (United States)

    Isikdag, U.

    2015-10-01

    Internet-of-Things (IoT) focuses on enabling communication between all devices, things that are existent in real life or that are virtual. Building Information Models (BIMs) and Building Information Modelling is a hype that has been the buzzword of the construction industry for last 15 years. BIMs emerged as a result of a push by the software companies, to tackle the problems of inefficient information exchange between different software and to enable true interoperability. In BIM approach most up-to-date an accurate models of a building are stored in shared central databases during the design and the construction of a project and at post-construction stages. GIS based city monitoring / city management applications require the fusion of information acquired from multiple resources, BIMs, City Models and Sensors. This paper focuses on providing a method for facilitating the GIS based fusion of information residing in digital building "Models" and information acquired from the city objects i.e. "Things". Once this information fusion is accomplished, many fields ranging from Emergency Response, Urban Surveillance, Urban Monitoring to Smart Buildings will have potential benefits.

  6. Transformation of Operations Management through Information Technology and Information System in Suning

    Institute of Scientific and Technical Information of China (English)

    SHEN Houcai; YAN Xiaojun

    2004-01-01

    Information technology and information system today play major roles in companies who are competitive in the global market. In this paper, we will study how Suning Appliance Chain changes her operations by using information technology and information system. Suning's Strategy,operations structure, especially her logistics system are discussed firstly; how information technology and information system support her operation and logistics to gain competitive capabilities are further discussed. Finally, the operation system transformation through IT/IS in Suning is studied by the use of a stochastic inventory model.

  7. Design and Implementation of IoT Cloud Moveable SCADA Supported by GSM for Industrial Applications

    Directory of Open Access Journals (Sweden)

    Mahmoud Shaker Nasr

    2017-05-01

    Full Text Available The world at the beginning of a new era of innovation and development with the rise of the industrial Internet or Internet of Things, IoT. It takes the space through the convergence of the global industrial system with the power of advanced computing, analytics, and low cost sensor devices and innovation of communication allowed by the Internet. One of the most important developments is IoT SCADA systems, which are considered as infrastructure of society because of their potential enormous in several industrial applications. This paper presents the design of a new generation of SCADA, named moveable SCADA , based on IoT cloud, and supported by GSM for more flexibility and reliability. The system is applied to industrial application that consists of three-control processes which are temperature, liquid level and motor processes. The three control processes data acquisition and controllers are implemented using embedded microcontroller system while a gateway is used to transfer the data proceed in field supervisor at first as well as main supervisor and monitoring engineer through IoT cloud. The system supported by GSM unit to support the system in case of internet failure. Also a camera is added to the system in order to monitor any location, any location (determined by any of the authorities in the field where the camera is mounted. The proposed SCADA is implemented practically and tested for many cases; the presented obtained results demonstrate that the system operation is very fair and meet the required targets.

  8. Scientific Data Services -- A High-Performance I/O System with Array Semantics

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Byna, Surendra; Rotem, Doron; Shoshani, Arie

    2011-09-21

    As high-performance computing approaches exascale, the existing I/O system design is having trouble keeping pace in both performance and scalability. We propose to address this challenge by adopting database principles and techniques in parallel I/O systems. First, we propose to adopt an array data model because many scientific applications represent their data in arrays. This strategy follows a cardinal principle from database research, which separates the logical view from the physical layout of data. This high-level data model gives the underlying implementation more freedom to optimize the physical layout and to choose the most effective way of accessing the data. For example, knowing that a set of write operations is working on a single multi-dimensional array makes it possible to keep the subarrays in a log structure during the write operations and reassemble them later into another physical layout as resources permit. While maintaining the high-level view, the storage system could compress the user data to reduce the physical storage requirement, collocate data records that are frequently used together, or replicate data to increase availability and fault-tolerance. Additionally, the system could generate secondary data structures such as database indexes and summary statistics. We expect the proposed Scientific Data Services approach to create a “live” storage system that dynamically adjusts to user demands and evolves with the massively parallel storage hardware.

  9. Operating system considerations in the multiprocessor MIDAS environment

    International Nuclear Information System (INIS)

    Weaver, D.; Maples, C.; Meng, J.; Rathbun, W.

    1983-01-01

    The operating system for MIDAS provides interfaces for custom hardware, debugging facilities, and run time support. The MIDAS architecture uses various specialized hardware devices for controlling the multiple processors and to achieve high I/O throughput. The operating system interfaces with the custom hardware for diagnostics, problem setup, and loading the processors with user code. After the code is loaded, a debugging facility may be used to examine or modify the program in any of the processors, or all the processors simultaneously. During execution of the code, the operating system monitors the processors for exceptional conditions, detects hardware failures, and gathers statistics on performance. This performance information includes histograms depicting instruction execution frequency and analysis of data flow

  10. The concept of information support system for operational personnel of operating NPPs

    International Nuclear Information System (INIS)

    Dunaev, V.G.; Golovanov, V.V.

    1993-01-01

    The paper has been prepared on the materials of the concept developed by the order of ''Rosenergoatom'' concern. In the present paper the main definitions, the principal objectives and functions of the operator support system (OSS) are stated, a brief analysis of operation features of some existing operator information systems is presented, the main trends of development of operator information support system are given, the way and the sequence for implementation of the systems for operating NPPs are reviewed. In this proposed concept in the first place are considered the information support systems for the operators of the power unit main control rooms, however, the presented principles may be applied while designing information support systems for operators of other control rooms of NPP. 4 refs

  11. IEEE 802.11ah: A Technology to Face the IoT Challenge.

    Science.gov (United States)

    Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-11-22

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  12. IoT: Tecnologías, usos, tendencias y desarrollo futuro

    OpenAIRE

    Bliznakoff del Valle, David J.

    2015-01-01

    Trabajo de investigación sobre el estado del IoT en el año 2014, previsiones de crecimiento y tecnologías futuras. Treball de recerca sobre l'estat del IoT l'any 2014, previsions de creixement i tecnologies futures. Master thesis for the Telecommunication Technologies program.

  13. Impact of supplier-specific investments in inter-organisational information systems on strategic electronic coordination: the moderation effect of buyer dependence

    Directory of Open Access Journals (Sweden)

    Teryokhin Sergei

    2018-03-01

    Full Text Available This paper examines the factors which influence sharing of the strategic information (in other words, electronic coordination in a buyer–supplier dyad. The antecedents of this coordination are examined rather well in the transaction cost economics (TCE theory and resource-dependency theory (RDT, while the supply chain management perspective is contemplated. The mentioned frameworks are used in the analysis. However, the research focus is narrowed down to the exploration of the antecedents of information exchange conducted via inter-organisational information systems (IOS. The empirical analysis is based on 198 observations of Norwegian companies operating in different types of industries. A regression model is used to test the hypotheses about the antecedents of strategic electronic coordination. The research results indicate that the direct effect of the supplier-specific investments in the IOS on the exchange of strategic information in the buyer–supplier dyad is not statistically significant. The supplier-specific investment in the IOS becomes positively associated with the strategic information exchange in the buyer–supplier dyad only when the buyer is dependent on the supplier. The buyer dependency creates a high motivation for the company to exchange the strategic information with the supplier who is more powerful in the dyad. This research concludes that the companies making substantial investments in the IOS for electronic coordination purposes may not reach their goals if relation-specific factors, such as buyer dependency, are not comprehensively considered.

  14. Proposals For The Secure Use Of IoT Technology In The Car Industry - Proposals on how to use IoT technology in the car industry but avoid its negative security consequences

    OpenAIRE

    Ramquist, Robin

    2016-01-01

    The Internet Of Things (IoT) is a hotter topic than ever. As devices and our daily life get connected to the IoT, we also put ourselves at risk. IoT security issues get reported on a regular basis, and experts are concerned that we will lose control of the situation. In this thesis, the IoT usage in the car industry is investigated and analyzed, and proposals for security issue mitigations are presented based on existing research. To do this work, existing research is being looked at and inte...

  15. An intelligent CAMAC I/O module based on the Signetics 8X300 microcontroller

    Science.gov (United States)

    Turner, G. W.; Hendricks, R. W.

    1980-03-01

    An intelligent CAMAC I/O module based on the Signetics 8X300 microcontroller has been developed. Sixteen 8-bit I/O ports have been utilized; eight are dedicated to data transfer with external devices and/or processes and eight are dedicated to communication with the CAMAC dataway. Separate status and data registers are provided. The input status port (SIN) can receive up to seven individual signals from external devices or the host computer while the output status port (SOUT) can be used to provide up to seven internally graded LAMs and one bit can be used to generate a Q-response for termination of block transfers. Diagnostic software has been developed to operate on the host computer which fully tests all implemented instructions. In our application the device is used in a high-speed memory mapping scheme for data acquisition with a two-dimensional position-sensitive detector system.

  16. An intelligent CAMAC I/O module based on the signetics 8X300 microcontroller

    International Nuclear Information System (INIS)

    Turner, G.W.; Hendricks, R.W.; Oak Ridge National Lab., TN

    1980-01-01

    An intelligent CAMAC I/O module based on the Signetics 8X300 microcontroller has been developed. Sixteen 8-bit I/O ports have been utilized; eight are dedicated to data transfers with external devices and/or processes and eight are dedicated to communication with the CAMAC dataway. Separate status and data registers are provided. The input status port (SIN) can receive up to seven individual signals from external devices or the host computer while the output status port (SOUT) can be used to provide up to seven internally graded LAMs and one bit can be used to generate a Q-response for termination of block transfers. Diagnostic software has been developed to operate on the host computer which fully tests all implemented instructions. In our application the device is used in a high-speed memory mapping scheme for data acquisition with a two-dimensional position-sensitive detector system. (orig.)

  17. IoT Service Clustering for Dynamic Service Matchmaking.

    Science.gov (United States)

    Zhao, Shuai; Yu, Le; Cheng, Bo; Chen, Junliang

    2017-07-27

    As the adoption of service-oriented paradigms in the IoT (Internet of Things) environment, real-world devices will open their capabilities through service interfaces, which enable other functional entities to interact with them. In an IoT application, it is indispensable to find suitable services for satisfying users' requirements or replacing the unavailable services. However, from the perspective of performance, it is inappropriate to find desired services from the service repository online directly. Instead, clustering services offline according to their similarity and matchmaking or discovering service online in limited clusters is necessary. This paper proposes a multidimensional model-based approach to measure the similarity between IoT services. Then, density-peaks-based clustering is employed to gather similar services together according to the result of similarity measurement. Based on the service clustering, the algorithms of dynamic service matchmaking, discovery, and replacement will be performed efficiently. Evaluating experiments are conducted to validate the performance of proposed approaches, and the results are promising.

  18. Collaborative Working Architecture for IoT-Based Applications.

    Science.gov (United States)

    Mora, Higinio; Signes-Pont, María Teresa; Gil, David; Johnsson, Magnus

    2018-05-23

    The new sensing applications need enhanced computing capabilities to handle the requirements of complex and huge data processing. The Internet of Things (IoT) concept brings processing and communication features to devices. In addition, the Cloud Computing paradigm provides resources and infrastructures for performing the computations and outsourcing the work from the IoT devices. This scenario opens new opportunities for designing advanced IoT-based applications, however, there is still much research to be done to properly gear all the systems for working together. This work proposes a collaborative model and an architecture to take advantage of the available computing resources. The resulting architecture involves a novel network design with different levels which combines sensing and processing capabilities based on the Mobile Cloud Computing (MCC) paradigm. An experiment is included to demonstrate that this approach can be used in diverse real applications. The results show the flexibility of the architecture to perform complex computational tasks of advanced applications.

  19. First Mile Challenges for Large-Scale IoT

    KAUST Repository

    Bader, Ahmed

    2017-03-16

    The Internet of Things is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the sheer scale of spatial traffic intensity that must be accommodated, primarily in the uplink direction. To that end, cellular networks are indeed a strong first mile candidate to accommodate the data tsunami to be generated by the IoT. However, IoT devices are required in the cellular paradigm to undergo random access procedures as a precursor to resource allocation. Such procedures impose a major bottleneck that hinders cellular networks\\' ability to support large-scale IoT. In this article, we shed light on the random access dilemma and present a case study based on experimental data as well as system-level simulations. Accordingly, a case is built for the latent need to revisit random access procedures. A call for action is motivated by listing a few potential remedies and recommendations.

  20. I/O routing in a multidimensional torus network

    Science.gov (United States)

    Chen, Dong; Eisley, Noel A.; Heidelberger, Philip

    2018-04-24

    A method, system and computer program product are disclosed for routing data packet in a computing system comprising a multidimensional torus compute node network including a multitude of compute nodes, and an I/O node network including a plurality of I/O nodes. In one embodiment, the method comprises assigning to each of the data packets a destination address identifying one of the compute nodes; providing each of the data packets with a toio value; routing the data packets through the compute node network to the destination addresses of the data packets; and when each of the data packets reaches the destination address assigned to said each data packet, routing said each data packet to one of the I/O nodes if the toio value of said each data packet is a specified value. In one embodiment, each of the data packets is also provided with an ioreturn value used to route the data packets through the compute node network.

  1. Minimizing End-to-End Interference in I/O Stacks Spanning Shared Multi-Level Buffer Caches

    Science.gov (United States)

    Patrick, Christina M.

    2011-01-01

    This thesis presents an end-to-end interference minimizing uniquely designed high performance I/O stack that spans multi-level shared buffer cache hierarchies accessing shared I/O servers to deliver a seamless high performance I/O stack. In this thesis, I show that I can build a superior I/O stack which minimizes the inter-application interference…

  2. Discovery of gaseous S2 in Io's Pele plume.

    Science.gov (United States)

    Spencer, J R; Jessup, K L; McGrath, M A; Ballester, G E; Yelle, R

    2000-05-19

    Spectroscopy of Io's Pele plume against Jupiter by the Hubble Space Telescope in October 1999 revealed absorption due to S2 gas, with a column density of 1.0 +/- 0.2 x 10(16) per square centimeter, and probably also SO(2) gas with a column density of 7 +/- 3 x 10(16) per square centimeter. This SO2/S2 ratio (3 to 12) is expected from equilibration with silicate magmas near the quartz-fayalite-magnetite or wüstite-magnetite buffers. Condensed S3 and S4, probable coloring agents in Pele's red plume deposits, may form by polymerization of the S2, which is unstable to ultraviolet photolysis. Diffuse red deposits near other Io volcanoes suggest that venting and polymerization of S2 gas is a widespread feature of Io volcanism.

  3. Astronauts and IoT: Toward True Human-Autonomy Teaming

    Science.gov (United States)

    Vera, Alonso

    2016-01-01

    Advances in the area of Internet of Things (IoT) or Cyber-Physical Systems will have a significant impact on many areas of human activity and commercial/technological development. One application of importance to NASA is the need to make crews on deep space missions more independent from earth in both their routine activities and handling of unexpected events. IoT will allow increasingly intelligent systems to be aware of what humans are doing, what tools/resources they are using, and what help they might need in terms of procedure execution in tasks such as assembly, maintenance, repair, and perhaps even in more complex activities like medical interventions. This talk focuses on the convergence of research and technologies that will be needed to effect such intelligent systems based on IoT.

  4. Feasibility and advantages of commercial process I/O systems for accelerator control

    International Nuclear Information System (INIS)

    Belshe, R.A.; Elischer, V.P.; Jacobson, V.

    1975-03-01

    Control systems for large particle accelerators must be able to handle analog and digital signals and timing coordination for devices which are spread over a large physical area. Many signals must be converted and transmitted to and from a central control area during each accelerator cycle. Digital transmission is often used to combat common mode and RF interference. Most accelerators in use today have met these requirements with custom process I/O hardware, data transmission systems, and computer interfaces. In-house development of hardware and software has been a very costly and time consuming process, but due to the lack of available commercial equipment, there was often no other alternative. Today, a large portion of these development costs can be avoided. Small control computers are now available off the shelf which have extensive process control I/O hardware and software capability. Computer control should be designed into accelerator systems from the beginning, using operating systems available from manufacturer. With most of the systems programming done, the designers can begin immediately on the applications software. (U.S.)

  5. Advanced information processing system

    Science.gov (United States)

    Lala, J. H.

    1984-01-01

    Design and performance details of the advanced information processing system (AIPS) for fault and damage tolerant data processing on aircraft and spacecraft are presented. AIPS comprises several computers distributed throughout the vehicle and linked by a damage tolerant data bus. Most I/O functions are available to all the computers, which run in a TDMA mode. Each computer performs separate specific tasks in normal operation and assumes other tasks in degraded modes. Redundant software assures that all fault monitoring, logging and reporting are automated, together with control functions. Redundant duplex links and damage-spread limitation provide the fault tolerance. Details of an advanced design of a laboratory-scale proof-of-concept system are described, including functional operations.

  6. iPhone and iOS Forensics Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    CERN Document Server

    Hoog, Andrew

    2011-01-01

    As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.  iPhone market share has increased to 50% of worldwide mobile phone usageEmployment in digital fo

  7. IPv6 Convergence for IoT Cyber–Physical Systems

    Directory of Open Access Journals (Sweden)

    Keith Nolan

    2018-03-01

    Full Text Available We describe the evolution of the IoT towards a heterogeneous multitopology network subject to dynamic change and volatility yet still capable of secure and dependable operation. As part of this evolution, we outline the key changes in wireless communications technologies and heterogeneous networking that have arisen during the development of the IoT. We briefly outline the emerging area of cyber–physical systems, and associated technical challenges. We then describe how IP convergence can be viewed as the narrow waist connecting endpoint devices and fieldbus devices with applications and services in new Industry 4.0, and cyber–physical system use cases. We outline how a protocol-packing approach can be used for encapsulating LoRaWAN frames with IEEE 802.15.4 and IEEE 802.11 frames. Extending this, we propose a method for ultracompressed IPv6 signaling, and detail how this can be achieved in an example low-power wide-area technology, namely LoRaWAN. To support our proposed approach, we provide real-world analyses where IPv6 commands undergo a process of ultracompression and are then conveyed to a LoRaWAN endpoint. We find that IPv6 command ultracompression can potentially support command packet sizes that are over 20x smaller than the reported worst-case maximum protocol data unit size of 81 bytes.

  8. Developing a knowledge system for information operations

    CSIR Research Space (South Africa)

    Leenen, L

    2011-03-01

    Full Text Available In this paper we describe a research project to develop an optimal information retrieval system in an Information Operations domain. Information Operations is the application and management of information to gain an advantage over an opponent...

  9. Service and multimedia data transmission in IoT networks using hybrid communication devices

    Directory of Open Access Journals (Sweden)

    Saveliev Anton

    2017-01-01

    Full Text Available Employment of various protocols and technologies in IoT networks leads to the lack of module unification and increase in incompatible technical solutions. Modern IoT networks are not designed for streaming audio/video data, so their application field is limited. Also, modern IoT networks should have connection areas for devices transferring data to the Internet, and consider hardware and software specific characteristics of these devices. We offer one-size-fits-all solution for organization of IoT network, using hybrid modules. These devices provide flexibility, scalability, energy efficiency and multi-use of network for the transfer of various types of data. This approach takes into account software and hardware features of the devices used for data transmission in IoT networks, which helps to automate connecting the modules chosen by user.

  10. 76 FR 58565 - Proposed Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Seriously...

    Science.gov (United States)

    2011-09-21

    ... (Operation Enduring Freedom/ Operation Iraqi Freedom Seriously Injured/Ill Service Member Veteran Worksheet... solicits comments on information provided to Operation Enduring Freedom/Operation Iraqi Freedom veterans... information technology. Title: Operation Enduring Freedom/Operation Iraqi Freedom Seriously Injured/Ill...

  11. Surface changes on Io during the Galileo mission

    Science.gov (United States)

    Geissler, P.; McEwen, A.; Phillips, C.; Keszthelyi, L.; Spencer, J.

    2004-01-01

    A careful survey of Galileo SSI global monitoring images revealed more than 80 apparent surface changes that took place on Io during the 5 year period of observation, ranging from giant plume deposits to subtle changes in the color or albedo of Patera surfaces. Explosive volcanic activity was discovered at four previously unrecognized centers: an unnamed patera to the south of Karei that produced a Pele-sized red ring, a patera to the west of Zal that produced a small circular bright deposit, a large orange ring detected near the north pole of Io, and a small bright ring near Io's south pole. Only a handful of Io's many active volcanoes produced large scale explosive eruptions, and several of these erupted repeatedly, leaving at least 83% of Io's surface unaltered throughout the Galileo mission. Most of the hot spots detected from SSI, NIMS and ground-based thermal observations caused no noticeable surface changes greater than 10 km in extent over the five year period. Surface changes were found at every location where active plumes were identified, including Acala which was never seen in sunlight and was only detected through auroral emissions during eclipse. Two types of plumes are distinguished on the basis of the size and color of their deposits, confirming post-Voyager suggestions by McEwen and Soderblom [Icarus 55 (1983) 191]. Smaller plumes produce near-circular rings typically 150-200 km in radius that are white or yellow in color unless contaminated with silicates, and frequently coat their surroundings with frosts of fine-grained SO2. The larger plumes are much less numerous, limited to a half dozen examples, and produce oval, orange or red, sulfur-rich rings with maximum radii in the north-south direction that are typically in the range from 500 to 550 km. Both types of plumes can be either episodic or quasi-continuous over a five year period. Repeated eruptions of the smaller SO2-rich plumes likely contribute significantly to Io's resurfacing rate

  12. Volcanic eruptions on Io: Heat flow, resurfacing, and lava composition

    Science.gov (United States)

    Blaney, Diana L.; Johnson, Torrence V.; Matson, Dennis L.; Veeder, Glenn J.

    1995-01-01

    We model an infrared outburst on Io as being due to a large, erupting lava flow which increased its area at a rate of 1.5 x 10(exp 5)/sq m and cooled from 1225 to 555 K over the 2.583-hr period of observation. The inferred effusion rate of 3 x 10(exp 5) cu m/sec for this eruption is very high, but is not unprece- dented on the Earth and is similar to the high eruption rates suggested for early lunar volcanism. Eruptions occur approxi- mately 6% of the time on Io. These eruptions provide ample resurfacing to explain Io's lack of impact craters. We suggest that the large total radiometric heat flow, 10(exp 14) W, and the size and temperature distribution of the thermal anomalies (McEwen et al. 1992; Veeder et al. 1994) can be accounted for by a series of silicate lava flows in various stages of cooling. We propose that the whole suite of Io's currently observed thermal anomalies was produced by multiple, high-eruptive-rate silicate flows within the past century.

  13. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  14. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  15. An Advanced IoT-based System for Intelligent Energy Management in Buildings

    Directory of Open Access Journals (Sweden)

    Vangelis Marinakis

    2018-02-01

    Full Text Available The energy sector is closely interconnected with the building sector and integrated Information and Communication Technologies (ICT solutions for effective energy management supporting decision-making at building, district and city level are key fundamental elements for making a city Smart. The available systems are designed and intended exclusively for a predefined number of cases and systems without allowing for expansion and interoperability with other applications that is partially due to the lack of semantics. This paper presents an advanced Internet of Things (IoT based system for intelligent energy management in buildings. A semantic framework is introduced aiming at the unified and standardised modelling of the entities that constitute the building environment. Suitable rules are formed, aiming at the intelligent energy management and the general modus operandi of Smart Building. In this context, an IoT-based system was implemented, which enhances the interactivity of the buildings’ energy management systems. The results from its pilot application are presented and discussed. The proposed system extends existing approaches and integrates cross-domain data, such as the building’s data (e.g., energy management systems, energy production, energy prices, weather data and end-users’ behaviour, in order to produce daily and weekly action plans for the energy end-users with actionable personalised information.

  16. An Advanced IoT-based System for Intelligent Energy Management in Buildings.

    Science.gov (United States)

    Marinakis, Vangelis; Doukas, Haris

    2018-02-16

    The energy sector is closely interconnected with the building sector and integrated Information and Communication Technologies (ICT) solutions for effective energy management supporting decision-making at building, district and city level are key fundamental elements for making a city Smart. The available systems are designed and intended exclusively for a predefined number of cases and systems without allowing for expansion and interoperability with other applications that is partially due to the lack of semantics. This paper presents an advanced Internet of Things (IoT) based system for intelligent energy management in buildings. A semantic framework is introduced aiming at the unified and standardised modelling of the entities that constitute the building environment. Suitable rules are formed, aiming at the intelligent energy management and the general modus operandi of Smart Building. In this context, an IoT-based system was implemented, which enhances the interactivity of the buildings' energy management systems. The results from its pilot application are presented and discussed. The proposed system extends existing approaches and integrates cross-domain data, such as the building's data (e.g., energy management systems), energy production, energy prices, weather data and end-users' behaviour, in order to produce daily and weekly action plans for the energy end-users with actionable personalised information.

  17. Behavioural informatics for improving water hygiene practice based on IoT environment.

    Science.gov (United States)

    Fu, Yang; Wu, Wenyan

    2018-02-01

    The development of Internet of Things (IoT) and latest Information and Communication Technologies (ICT) have changed the nature of healthcare monitoring and health behaviour intervention in many applications. Water hygiene and water conservation behaviour intervention as important influence factors to human health are gaining much attentions for improving sustained sanitation practice. Based on face-to-face delivery, typical behaviour intervention method is costly and hardly to provide all day access to personalised intervention guidance and feedbacks. In this study, we presented a behavioural information system and water use behaviour model using IoT platform. Using Expanded Theory of Planned Behaviour (ETPB) and adopted structure equation model, this study offers a solution for understanding the behaviour intervention mechanism and methodology for developing empirical model. A case study of behaviour intervention model is presented by utilising residential water conservation behaviour data collected in China. Results suggested that cultural differences have significant influences on the understanding of intervention drivers, promoting projects and increasing awareness, which could improve the behaviour intervention efficiency and further facilitate the improvement of water hygiene practice. The performance evaluation of water saving dimension is discussed as well in the paper. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. An Advanced IoT-based System for Intelligent Energy Management in Buildings

    Science.gov (United States)

    Doukas, Haris

    2018-01-01

    The energy sector is closely interconnected with the building sector and integrated Information and Communication Technologies (ICT) solutions for effective energy management supporting decision-making at building, district and city level are key fundamental elements for making a city Smart. The available systems are designed and intended exclusively for a predefined number of cases and systems without allowing for expansion and interoperability with other applications that is partially due to the lack of semantics. This paper presents an advanced Internet of Things (IoT) based system for intelligent energy management in buildings. A semantic framework is introduced aiming at the unified and standardised modelling of the entities that constitute the building environment. Suitable rules are formed, aiming at the intelligent energy management and the general modus operandi of Smart Building. In this context, an IoT-based system was implemented, which enhances the interactivity of the buildings’ energy management systems. The results from its pilot application are presented and discussed. The proposed system extends existing approaches and integrates cross-domain data, such as the building’s data (e.g., energy management systems), energy production, energy prices, weather data and end-users’ behaviour, in order to produce daily and weekly action plans for the energy end-users with actionable personalised information. PMID:29462957

  19. IAACaaS: IoT Application-Scoped Access Control as a Service

    Directory of Open Access Journals (Sweden)

    Álvaro Alonso

    2017-10-01

    Full Text Available access control is a key element when guaranteeing the security of online services. However, devices that make the Internet of Things have some special requirements that foster new approaches to access control mechanisms. Their low computing capabilities impose limitations that make traditional paradigms not directly applicable to sensors and actuators. In this paper, we propose a dynamic, scalable, IoT-ready model that is based on the OAuth 2.0 protocol and that allows the complete delegation of authorization, so that an as a service access control mechanism is provided. Multiple tenants are also supported by means of application-scoped authorization policies, whose roles and permissions are fine-grained enough to provide the desired flexibility of configuration. Besides, OAuth 2.0 ensures interoperability with the rest of the Internet, yet preserving the computing constraints of IoT devices, because its tokens provide all the necessary information to perform authorization. The proposed model has been fully implemented in an open-source solution and also deeply validated in the scope of FIWARE, a European project with thousands of users, the goal of which is to provide a framework for developing smart applications and services for the future Internet. We provide the details of the deployed infrastructure and offer the analysis of a sample smart city setup that takes advantage of the model. We conclude that the proposed solution enables a new access control as a service paradigm that satisfies the special requirements of IoT devices in terms of performance, scalability and interoperability.

  20. Long Term Monitoring of the Io Plasma Torus During the Galileo Encounter

    Science.gov (United States)

    Brown, Michael E.

    2002-01-01

    In the fall of 1999, the Galileo spacecraft made four passes into the Io plasma torus, obtaining the best in situ measurements ever of the particle and field environment in this densest region of the Jovian magnetosphere. Supporting observations from the ground are vital for understanding the global and temporal context of the in situ observations. We conducted a three-month-long Io plasma torus monitoring campaign centered on the time of the Galileo plasma torus passes to support this aspect of the Galileo mission. The almost-daily plasma density and temperature measurements obtained from our campaign allow the much more sparse but also much more detailed Galileo data to be used to address the issues of the structure of the Io plasma torus, the stability mechanism of the Jovian magnetosphere, the transport of material from the source region near Io, and the nature and source of persistent longitudinal variations. Combining the ground-based monitoring data with the detailed in situ data offers the only possibility for answering some of the most fundamental questions about the nature of the Io plasma torus.

  1. Io After Galileo A New View of Jupiter’s Volcanic Moon

    CERN Document Server

    Lopes, Rosaly M. C

    2007-01-01

    Jupiter’s moon Io is the Solar System’s most exotic satellite. Active volcanism on Io was discovered from observations by the Voyager 1 spacecraft in 1979, confirming a possibility suggested from theoretical studies of Io’s orbit. Our knowledge of Io’s volcanism, composition, and space environment were significantly increased as a result of observations by the Galileo spacecraft from 1996 through 2001. The end of the Galileo mission in 2003 makes this an ideal time to summarize the new results in a book as no book has ever been written about Jupiter’s volcanic moon, Io.

  2. The PMIPv6-Based Group Binding Update for IoT Devices

    Directory of Open Access Journals (Sweden)

    Jianfeng Guan

    2016-01-01

    Full Text Available Internet of Things (IoT has been booming with rapid increase of the various wearable devices, vehicle embedded devices, and so on, and providing the effective mobility management for these IoT devices becomes a challenge due to the different application scenarios as well as the limited energy and bandwidth. Recently, lots of researchers have focused on this topic and proposed several solutions based on the combination of IoT features and traditional mobility management protocols, in which most of these schemes take the IoT devices as mobile networks and adopt the NEtwork MObility (NEMO and its variants to provide the mobility support. However, these solutions are in face of the heavy signaling cost problem. Since IoT devices are generally combined to realize the complex functions, these devices may have similar movement behaviors. Clearly analyzing these characters and using them in the mobility management will reduce the signaling cost and improve the scalability. Motivated by this, we propose a PMIPv6-based group binding update method. In particular, we describe its group creation procedure, analyze its impact on the mobility management, and derive its reduction ratio in terms of signaling cost. The final results show that the introduction of group binding update can remarkably reduce the signaling cost.

  3. Design for an IO block array in a tile-based FPGA

    International Nuclear Information System (INIS)

    Ding Guangxin; Chen Lingdou; Liu Zhongli

    2009-01-01

    A design for an IO block array in a tile-based FPGA is presented. Corresponding with the characteristics of the FPGA, each IO cell is composed of a signal path, local routing pool and configurable input/output buffers. Shared programmable registers in the signal path can be configured for the function of JTAG, without specific boundary scan registers/latches, saving layout area. The local routing pool increases the flexibility of routing and the routability of the whole FPGA. An auxiliary power supply is adopted to increase the performance of the IO buffers at different configured IO standards. The organization of the IO block array is described in an architecture description file, from which the array layout can be accomplished through use of an automated layout assembly tool. This design strategy facilitates the design of FPGAs with different capacities or architectures in an FPGA family series. The bond-out schemes of the same FPGA chip in different packages are also considered. The layout is based on SMIC 0.13 μm logic 1P8M salicide 1.2/2.5 V CMOS technology. Our performance is comparable with commercial SRAM-based FPGAs which use a similar process. (semiconductor integrated circuits)

  4. Small-World and Scale-Free Network Models for IoT Systems

    Directory of Open Access Journals (Sweden)

    Insoo Sohn

    2017-01-01

    Full Text Available It is expected that Internet of Things (IoT revolution will enable new solutions and business for consumers and entrepreneurs by connecting billions of physical world devices with varying capabilities. However, for successful realization of IoT, challenges such as heterogeneous connectivity, ubiquitous coverage, reduced network and device complexity, enhanced power savings, and enhanced resource management have to be solved. All these challenges are heavily impacted by the IoT network topology supported by massive number of connected devices. Small-world networks and scale-free networks are important complex network models with massive number of nodes and have been actively used to study the network topology of brain networks, social networks, and wireless networks. These models, also, have been applied to IoT networks to enhance synchronization, error tolerance, and more. However, due to interdisciplinary nature of the network science, with heavy emphasis on graph theory, it is not easy to study the various tools provided by complex network models. Therefore, in this paper, we attempt to introduce basic concepts of graph theory, including small-world networks and scale-free networks, and provide system models that can be easily implemented to be used as a powerful tool in solving various research problems related to IoT.

  5. Data-Filtering System to Avoid Total Data Distortion in IoT Networking

    Directory of Open Access Journals (Sweden)

    Dae-Young Kim

    2017-01-01

    Full Text Available In the Internet of Things (IoT networking, numerous objects are connected to a network. They sense events and deliver the sensed information to the cloud. A lot of data is generated in the IoT network, and servers in the cloud gather the sensed data from the objects. Then, the servers analyze the collected data and provide proper intelligent services to users through the results of the analysis. When the server analyzes the collected data, if there exists malfunctioning data, distortional results of the analysis will be generated. The distortional results lead to misdirection of the intelligent services, leading to poor user experience. In the analysis for intelligent services in IoT, malfunctioning data should be avoided because integrity of the collected data is crucial. Therefore, this paper proposes a data-filtering system for the server in the cloud. The proposed data-filtering system is placed in front of the server and firstly receives the sensed data from the objects. It employs the naïve Bayesian classifier and, by learning, classifies the malfunctioning data from among the collected data. Data with integrity is delivered to the server for analysis. Because the proposed system filters the malfunctioning data, the server can obtain accurate analysis results and reduce computing load. The performance of the proposed data-filtering system is evaluated through computer simulation. Through the simulation results, the efficiency of the proposed data-filtering system is shown.

  6. Analysis of the frontier technology of agricultural IoT and its predication research

    Science.gov (United States)

    Han, Shuqing; Zhang, Jianhua; Zhu, Mengshuai; Wu, Jianzhai; Shen, Chen; Kong, Fantao

    2017-09-01

    Agricultural IoT (Internet of Things) develops rapidly. Nanotechnology, biotechnology and optoelectronic technology are successfully integrated into the agricultural sensor technology. Big data, cloud computing and artificial intelligence technology have also been successfully used in IoT. This paper carries out the research on integration of agricultural sensor technology, nanotechnology, biotechnology and optoelectronic technology and the application of big data, cloud computing and artificial intelligence technology in agricultural IoT. The advantages and development of the integration of nanotechnology, biotechnology and optoelectronic technology with agricultural sensor technology were discussed. The application of big data, cloud computing and artificial intelligence technology in IoT and their development trend were analysed.

  7. Designing the IoT sandbox

    NARCIS (Netherlands)

    Frens, Joep; Funk, Mathias; van Hout, Bastiaan; Le Blanc, Joep

    2018-01-01

    This pictorial describes the design and design process of the IoT Sandbox: a (scale model of a) smart home equipped with actuators and a modular interface that controls the interactive aspects of the smart home. This modular interface can 'grow" together with the house it controls whereby it offers

  8. Management of solar energy in microgrids using IoT-based dependable control

    OpenAIRE

    Phung, Manh Duong; De La Villefromoy, Michel; Ha, Quang

    2017-01-01

    Solar energy generation requires efficient monitoring and management in moving towards technologies for net-zero energy buildings. This paper presents a dependable control system based on the Internet of Things (IoT) to control and manage the energy flow of renewable energy collected by solar panels within a microgrid. Data for optimal control include not only measurements from local sensors but also meteorological information retrieved in real-time from online sources. For system fault toler...

  9. Human centric security and privacy for the IoT using formal techniques

    OpenAIRE

    Kammueller, Florian

    2018-01-01

    In this paper, we summarize a new approach to make security and privacy issues in the Internet of Things (IoT) more transparent for vulnerable users. As a pilot project, we investigate monitoring of Alzheimer’s patients for a low-cost early warning system based on bio-markers supported with smart technologies. To provide trustworthy and secure IoT infrastructures, we employ formal methods and techniques that allow specification of IoT scenarios with human actors, refinement and analysis of at...

  10. SYNAISTHISI: an IoT-powered smart visitor management and cognitive recommendations system

    Science.gov (United States)

    Thanos, Giorgos Konstandinos; Karafylli, Christina; Karafylli, Maria; Zacharakis, Dimitris; Papadimitriou, Apostolis; Dimitros, Kostantinos; Kanellopoulou, Konstantina; Kyriazanos, Dimitris M.; Thomopoulos, Stelios C. A.

    2016-05-01

    Location-based and navigation services are really needed to help visitors and audience of big events, complex buildings, shopping malls, airports and large companies. However, the lack of GPS and proper mapping indoors usually renders location-based applications and services useless or simply not applicable in such environments. SYNAISTHISI introduces a mobile application for smartphones which offers navigation capabilities outside and inside buildings and through multiple floor levels. The application comes together with a suite of helpful services, including personalized recommendations, visit/event management and a helpful search functionality in order to navigate to a specific location, event or person. As the user finds his way towards his destination, NFC-enabled checkpoints and bluetooth beacons assist him, while offering re-routing, check-in/out capabilities and useful information about ongoing meetings and nearby events. The application is supported by a back-end GIS system which can provide a broad and clear view to event organizers, campus managers and field personnel for purposes of event logistics, safety and security. SYNAISTHISI system comes with plenty competitive advantages including (a) Seamless Navigation as users move between outdoor and indoor areas and different floor levels by using innovative routing algorithms, (b) connection to and powered by IoT platform, for localization and real-time information feedback, (c) dynamic personalized recommendations based on user profile, location and real-time information provided by the IoT platform and (d) Indoor localization without the need for expensive infrastructure and installations.

  11. AdiosStMan: Parallelizing Casacore Table Data System using Adaptive IO System

    Science.gov (United States)

    Wang, R.; Harris, C.; Wicenec, A.

    2016-07-01

    In this paper, we investigate the Casacore Table Data System (CTDS) used in the casacore and CASA libraries, and methods to parallelize it. CTDS provides a storage manager plugin mechanism for third-party developers to design and implement their own CTDS storage managers. Having this in mind, we looked into various storage backend techniques that can possibly enable parallel I/O for CTDS by implementing new storage managers. After carrying on benchmarks showing the excellent parallel I/O throughput of the Adaptive IO System (ADIOS), we implemented an ADIOS based parallel CTDS storage manager. We then applied the CASA MSTransform frequency split task to verify the ADIOS Storage Manager. We also ran a series of performance tests to examine the I/O throughput in a massively parallel scenario.

  12. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities

    Science.gov (United States)

    Aslam, Saleem; Hasan, Najam Ul; Jang, Ju Wook; Lee, Kyung-Geun

    2016-01-01

    This paper highlights three critical aspects of the internet of things (IoTs), namely (1) energy efficiency, (2) energy balancing and (3) quality of service (QoS) and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF) energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH) on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP)-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU) activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones. PMID:27918424

  13. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities.

    Science.gov (United States)

    Aslam, Saleem; Hasan, Najam Ul; Jang, Ju Wook; Lee, Kyung-Geun

    2016-12-02

    This paper highlights three critical aspects of the internet of things (IoTs), namely (1) energy efficiency, (2) energy balancing and (3) quality of service (QoS) and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF) energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH) on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP)-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU) activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones.

  14. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities

    Directory of Open Access Journals (Sweden)

    Saleem Aslam

    2016-12-01

    Full Text Available This paper highlights three critical aspects of the internet of things (IoTs, namely (1 energy efficiency, (2 energy balancing and (3 quality of service (QoS and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones.

  15. Comparing the Atmospheric Losses at Io and Europa

    Science.gov (United States)

    Dols, V. J.; Bagenal, F.; Crary, F. J.; Cassidy, T.

    2017-12-01

    At Io and Europa, the interaction of the Jovian plasma with the moon atmosphere leads to a significant loss of atomic/molecular neutrals and ions to space. The processes that lead to atmospheric escape are diverse: atmospheric sputtering, molecular dissociation, molecular ion recombination, Jeans escape etc. Each process leads to neutrals escaping at different velocities (i.e. electron impact dissociation leads to very slow atomic neutrals, sputtering might eject faster molecular neutrals). Some neutrals will be ejected out of the Jovian system; others will form extended neutral clouds along the orbit of the moons. These atomic/molecular extended neutral clouds are probably the main source of plasma for the Jovian magnetosphere. They are difficult to observe directly thus their composition and density are still poorly constrained. A future modeling of the formation of these extended clouds requires an estimate of their atmospheric sources. We estimate the atmospheric losses at Io and Europa for each loss process with a multi-species chemistry model, using a prescribed atmospheric distribution consistent with the observations. We compare the neutral losses at Io and Europa.

  16. Galileo SSI and Cassini ISS Observations of Io's Pele Hotspot: Temperatures, Areas, and Variation with Time

    Science.gov (United States)

    Radebaugh, J.; McEwen, A. S.; Milazzo, M.; Davies, A. G.; Keszthelyi, L. P.; Geissler, P.

    2002-01-01

    Temperatures of Io's Pele hotspot were found using dual-filter observations from Galileo and Cassini. Temperatures average 1375 K, but vary widely over tens of minutes. Dropoff in emission with rotation consistent with lava fountaining at a lava lake. Additional information is contained in the original extended abstract.

  17. Proof of Concept of Home IoT Connected Vehicles

    OpenAIRE

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-01-01

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the con...

  18. Security Framework for the Web of IoT Platforms

    OpenAIRE

    Atarah, Ivan Akoribila

    2017-01-01

    Connected devices of IoT platforms are known to produce, process and exchange vast amounts of data, most of it sensitive or personal, that need to be protected. However, achieving minimal data protection requirements such as confidentiality, integrity, availability and non-repudiation in IoT platforms is a non-trivial issue. For one reason, the trillions of interacting devices provide larger attack surfaces. Secondly, high levels of personal and private data sharing in this ubiquitous and het...

  19. BIM and IoT: A Synopsis from GIS Perspective

    Directory of Open Access Journals (Sweden)

    U. Isikdag

    2015-10-01

    Full Text Available Internet-of-Things (IoT focuses on enabling communication between all devices, things that are existent in real life or that are virtual. Building Information Models (BIMs and Building Information Modelling is a hype that has been the buzzword of the construction industry for last 15 years. BIMs emerged as a result of a push by the software companies, to tackle the problems of inefficient information exchange between different software and to enable true interoperability. In BIM approach most up-to-date an accurate models of a building are stored in shared central databases during the design and the construction of a project and at post-construction stages. GIS based city monitoring / city management applications require the fusion of information acquired from multiple resources, BIMs, City Models and Sensors. This paper focuses on providing a method for facilitating the GIS based fusion of information residing in digital building “Models” and information acquired from the city objects i.e. “Things”. Once this information fusion is accomplished, many fields ranging from Emergency Response, Urban Surveillance, Urban Monitoring to Smart Buildings will have potential benefits.

  20. Research and implementation on improving I/O performance of streaming media storage system

    Science.gov (United States)

    Lu, Zheng-wu; Wang, Yu-de; Jiang, Guo-song

    2008-12-01

    In this paper, we study the special requirements of a special storage system: streaming media server, and propose a solution to improve I/O performance of RAID storage system. The solution is suitable for streaming media applications. A streaming media storage subsystem includes the I/O interfaces, RAID arrays, I/O scheduling and device drivers. The solution is implemented on the top of the storage subsystem I/O Interface. Storage subsystem is the performance bottlenecks of a streaming media system, and I/O interface directly affect the performance of the storage subsystem. According to theoretical analysis, 64 KB block-size is most appropriate for streaming media applications. We carry out experiment in detail, and verified that the proper block-size really is 64KB. It is in accordance with our analysis. The experiment results also show that by using DMA controller, efficient memory management technology and mailbox interface design mechanism, streaming media storage system achieves a high-speed data throughput.

  1. The Linkage of Joint Operational Fires, Information Operations and the Army: Does the Army Have Effective Feedback Mechanisms that Integrate Operational Fires (Physical Destruction) and Information Operations?

    National Research Council Canada - National Science Library

    Mills, Charles

    2004-01-01

    The information revolution seems to hold a lot of promise to the U.S. economy and the U.S. military, but rigid bureaucratic hierarchies make it extremely difficult for effective integration of operational fires and information operations...

  2. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    OpenAIRE

    Bako Ali; Ali Ismail Awad

    2018-01-01

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in te...

  3. Towards an MDD Based Framework for Self Adaptive IoT Applications Development

    OpenAIRE

    Abuseta, Yousef

    2018-01-01

    As technology and communication advances, more devices (and things) are able to connect to the Internet and talk to each other to achieve a common goal which results in the emergence of the Internet of Things (IoT) era. It is believed that IoT will bring up a limitless number of applications and business opportunities that will affect almost every aspect of our life. Research has already been conducted to investigate the challenges that obstruct the realization of IoT along with the promising...

  4. Io Pele plume

    Science.gov (United States)

    2000-01-01

    Voyager 1 took this narrow-angle camera image on 5 March 1979 from a distance of 450,000 kilometers. At this geometry, the camera looks straight down through a volcanic plume at one of Io's most active volcanos, Pele. The large heart-shaped feature is the region where Pele's plume falls to the surface. At the center of the 'heart' is the small dark fissure that is the source of the eruption. The Voyager Project is managed by the Jet Propulsion Laboratory for NASA's Office of Space Science.

  5. 77 FR 7243 - Proposed Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Veterans...

    Science.gov (United States)

    2012-02-10

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0728] Proposed Information Collection (Operation Enduring Freedom/ Operation Iraqi Freedom Veterans Health Needs Assessment) Activities Under OMB....'' SUPPLEMENTARY INFORMATION: Title: Operation Enduring Freedom/Operation Iraqi Freedom Veterans Health Needs...

  6. Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    OpenAIRE

    Garfinkel, Simson

    2013-01-01

    Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...

  7. Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    OpenAIRE

    Schulte Christopher

    2011-01-01

    Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...

  8. Occurrence reporting and processing of operations information

    International Nuclear Information System (INIS)

    1997-01-01

    DOE O 232.1A, Occurrence Reporting and Processing of Operations Information, and 10 CFR 830.350, Occurrence Reporting and Processing of Operations Information (when it becomes effective), along with this manual, set forth occurrence reporting requirements for Department of Energy (DOE) Departmental Elements and contractors responsible for the management and operation of DOE-owned and -leased facilities. These requirements include categorization of occurrences related to safety, security, environment, health, or operations (''Reportable Occurrences''); DOE notification of these occurrences; and the development and submission of documented follow-up reports. This Manual provides detailed information for categorizing and reporting occurrences at DOE facilities. Information gathered by the Occurrence Reporting and processing System is used for analysis of the Department's performance in environmental protection, safeguards and security, and safety and health of its workers and the public. This information is also used to develop lessons learned and document events that significantly impact DOE operations

  9. Occurrence reporting and processing of operations information

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-07-21

    DOE O 232.1A, Occurrence Reporting and Processing of Operations Information, and 10 CFR 830.350, Occurrence Reporting and Processing of Operations Information (when it becomes effective), along with this manual, set forth occurrence reporting requirements for Department of Energy (DOE) Departmental Elements and contractors responsible for the management and operation of DOE-owned and -leased facilities. These requirements include categorization of occurrences related to safety, security, environment, health, or operations (``Reportable Occurrences``); DOE notification of these occurrences; and the development and submission of documented follow-up reports. This Manual provides detailed information for categorizing and reporting occurrences at DOE facilities. Information gathered by the Occurrence Reporting and processing System is used for analysis of the Department`s performance in environmental protection, safeguards and security, and safety and health of its workers and the public. This information is also used to develop lessons learned and document events that significantly impact DOE operations.

  10. Mountains on Io: High-resolution Galileo observations, initial interpretations, and formation models

    Science.gov (United States)

    Turtle, E.P.; Jaeger, W.L.; Keszthelyi, L.P.; McEwen, A.S.; Milazzo, M.; Moore, J.; Phillips, C.B.; Radebaugh, J.; Simonelli, D.; Chuang, F.; Schuster, P.; Alexander, D.D.A.; Capraro, K.; Chang, S.-H.; Chen, A.C.; Clark, J.; Conner, D.L.; Culver, A.; Handley, T.H.; Jensen, D.N.; Knight, D.D.; LaVoie, S.K.; McAuley, M.; Mego, V.; Montoya, O.; Mortensen, H.B.; Noland, S.J.; Patel, R.R.; Pauro, T.M.; Stanley, C.L.; Steinwand, D.J.; Thaller, T.F.; Woncik, P.J.; Yagi, G.M.; Yoshimizu, J.R.; Alvarez Del Castillo, E.M.; Beyer, R.; Branston, D.; Fishburn, M.B.; Muller, Birgit; Ragan, R.; Samarasinha, N.; Anger, C.D.; Cunningham, C.; Little, B.; Arriola, S.; Carr, M.H.; Asphaug, E.; Morrison, D.; Rages, K.; Banfield, D.; Bell, M.; Burns, J.A.; Carcich, B.; Clark, B.; Currier, N.; Dauber, I.; Gierasch, P.J.; Helfenstein, P.; Mann, M.; Othman, O.; Rossier, L.; Solomon, N.; Sullivan, R.; Thomas, P.C.; Veverka, J.; Becker, T.; Edwards, K.; Gaddis, L.; Kirk, R.; Lee, E.; Rosanova, T.; Sucharski, R.M.; Beebe, R.F.; Simon, A.; Belton, M.J.S.; Bender, K.; Fagents, S.; Figueredo, P.; Greeley, R.; Homan, K.; Kadel, S.; Kerr, J.; Klemaszewski, J.; Lo, E.; Schwarz, W.; Williams, D.; Williams, K.; Bierhaus, B.; Brooks, S.; Chapman, C.R.; Merline, B.; Keller, J.; Tamblyn, P.; Bouchez, A.; Dyundian, U.; Ingersoll, A.P.; Showman, A.; Spitale, J.; Stewart, S.; Vasavada, A.; Breneman, H.H.; Cunningham, W.F.; Johnson, T.V.; Jones, T.J.; Kaufman, J.M.; Klaasen, K.P.; Levanas, G.; Magee, K.P.; Meredith, M.K.; Orton, G.S.; Senske, D.A.; West, A.; Winther, D.; Collins, G.; Fripp, W.J.; Head, J. W.; Pappalardo, R.; Pratt, S.; Prockter, L.; Spaun, N.; Colvin, T.; Davies, M.; DeJong, E.M.; Hall, J.; Suzuki, S.; Gorjian, Z.; Denk, T.; Giese, B.; Koehler, U.; Neukum, G.; Oberst, J.; Roatsch, T.; Tost, W.; Wagner, R.; Dieter, N.; Durda, D.; Geissler, P.; Greenberg, R.J.; Hoppa, G.; Plassman, J.; Tufts, R.; Fanale, F.P.; Granahan, J.C.

    2001-01-01

    During three close flybys in late 1999 and early 2000 the Galileo spacecraft ac-quired new observations of the mountains that tower above Io's surface. These images have revealed surprising variety in the mountains' morphologies. They range from jagged peaks several kilometers high to lower, rounded structures. Some are very smooth, others are covered by numerous parallel ridges. Many mountains have margins that are collapsing outward in large landslides or series of slump blocks, but a few have steep, scalloped scarps. From these observations we can gain insight into the structure and material properties of Io's crust as well as into the erosional processes acting on Io. We have also investigated formation mechanisms proposed for these structures using finite-element analysis. Mountain formation might be initiated by global compression due to the high rate of global subsidence associated with Io's high resurfacing rate; however, our models demonstrate that this hypothesis lacks a mechanism for isolating the mountains. The large fraction (???40%) of mountains that are associated with paterae suggests that in some cases these features are tectonically related. Therefore we have also simulated the stresses induced in Io's crust by a combination of a thermal upwelling in the mantle with global lithospheric compression and have shown that this can focus compressional stresses. If this mechanism is responsible for some of Io's mountains, it could also explain the common association of mountains with paterae. Copyright 2001 by the American Geophysical Union.

  11. Power Consumption and Calculation Requirement Analysis of AES for WSN IoT.

    Science.gov (United States)

    Hung, Chung-Wen; Hsu, Wen-Ting

    2018-05-23

    Because of the ubiquity of Internet of Things (IoT) devices, the power consumption and security of IoT systems have become very important issues. Advanced Encryption Standard (AES) is a block cipher algorithm is commonly used in IoT devices. In this paper, the power consumption and cryptographic calculation requirement for different payload lengths and AES encryption types are analyzed. These types include software-based AES-CB, hardware-based AES-ECB (Electronic Codebook Mode), and hardware-based AES-CCM (Counter with CBC-MAC Mode). The calculation requirement and power consumption for these AES encryption types are measured on the Texas Instruments LAUNCHXL-CC1310 platform. The experimental results show that the hardware-based AES performs better than the software-based AES in terms of power consumption and calculation cycle requirements. In addition, in terms of AES mode selection, the AES-CCM-MIC64 mode may be a better choice if the IoT device is considering security, encryption calculation requirement, and low power consumption at the same time. However, if the IoT device is pursuing lower power and the payload length is generally less than 16 bytes, then AES-ECB could be considered.

  12. Teaching Management System with Applications of RFID and IoT Technology

    Directory of Open Access Journals (Sweden)

    Ping Tan

    2018-02-01

    Full Text Available Currently, Internet of Things (IoT technologies are used in many areas, such as intelligent transportation, smart city, hospital, games, education. Earlier interactive response system uses infrared or radio frequency (RF wireless communication technologies to transmit the students’ answer to teachers’ managerment system, where there exists high cost, inconvenient usage, difficult deployment. How to use IoT to improve the quality of higher education becomes a very important topic in the researh area of teaching. Radio Frequency Identification (RFID is one of key technologies to implement IoT applications, and most of universities use the High Frequency (HF RFID card as the students’ identification devices in China. In this paper, a kind of WiFi supported RFID reader (WiRF is implemented using open source hardware platforms, such as Node MCU and RFID-RC522. Then the proposed WiRF system is used to assist teacher to perform automatic attendance record and students’ behavior record. In addition, Quick Response (QR code is another technology to enable IoT. In this paper, QR code is designed to quickly access course video and perform real-time interactive response in the classroom, which will provide multidimensional learning and strengthen the motivation of students’ learning. This IoT system can improve the attendance of students, and give a positive impact on students’ learning process for higher education.

  13. Identification of radio emission from the Io flux tube

    International Nuclear Information System (INIS)

    Riddle, A.C.

    1983-01-01

    Many theories and observations suggest that Jovian decametric radio emission is generated in flux tubes that pass close to Io's orbit. However, comparison of theory and observation is hindered by lack of knowledge as to which specific flux tube is responsible for a particular emission. In this note, emission from the instantaneous Io flux tube is identified. This makes possible a mapping of emissions onto the causative flux tubes for a significant range of Jovian longitudes (240 0 --360 0 )

  14. Knowledge Organization = Information Organization?

    DEFF Research Database (Denmark)

    Hjørland, Birger

    Are the terms ―information organization‖ (IO), ―organization of information‖ (OI) and ―information architecture‖ (IA) synonyms for knowledge organization (KO)? This study uses bibliometric methods, among others, to determine some relations between these terms and their meanings. Apparently the data...... shows that these terms should not be considered synonyms because each of the terms IO, OI, IA and KO produce a different set of high ranked authors, journals and papers. In many cases the terms are, however, used interchangeably (and thus indicating synonymity) and it is argued that the underlying...

  15. Thermal Remote Sensing of Lava Lakes on Io and Earth (Invited)

    Science.gov (United States)

    Davies, A. G.; Keszthelyi, L. P.; McEwen, A. S.

    2013-12-01

    Volcanology has been transformed by remote sensing. For decades, Earth's volcanoes have been studied in the infrared by a wide variety of instruments on spacecraft at widely varying spectral, spatial and temporal resolutions, for which techniques have been developed to interpret and understand ongoing volcanic eruptions. The study of volcanism on Io, the only Solar System body besides Earth known to have ongoing, high temperature, silicate-based effusive and explosive volcanic eruptions, requires new remote sensing techniques. The extraordinary volcanism allows us to examine Io's interior and composition from the material erupted onto the surface. For Io, the biggest question in the wake of NASA's Galileo mission concerns the eruption temperature of Io's dominant silicate lavas [1,2]. Constraining eruption temperature constrains magma composition, in turn a reflection of the composition, physical state and tidal heating within Io. However, the extraction of lava eruption temperature from remote sensing data is difficult. Detector saturation is likely except when the hot material fills a tiny fraction of a resolution element, unless instruments are designed for this objective. High temperature lava surfaces cool rapidly, so remote observations can miss the peak temperature. Observations at different wavelengths must be acquired nearly simultaneously to derive accurate temperatures of very hot and dynamic sources [3]. Uncertainties regarding hot lava emissivity [4] also reduce the confidence in derived temperatures. From studying thermal emission data from different styles of volcanic activity on Earth by remote sensing in conjunction with contemporaneous observations on the ground, it is found that only certain styles of volcanic activity are suitable for deriving liquid lava temperatures [3]. Active lava lakes are particularly useful, especially during a phase of lava fountaining. Examination and analysis of FLIR data obtained at the Erta'Ale (Ethiopia) basaltic

  16. Investment Opportunity Set (IOS Berbasis Pertumbuhan Perusahaan dan Kaitannya Dengan Upaya Peningkatan Nilai Perusahaan

    Directory of Open Access Journals (Sweden)

    Eka Handriani

    2016-06-01

    Full Text Available This research aims to develop theoretical approach to complete the conceptual controversy regarding the research results on the investment policy and firm value. This research employs firm value, investment opportunity set (IOS, funding and dividend as variables. Dividends in the research proxied by dividend pay out ratio (DPR, funding proxied by DER and firm value indicated by Tobin’s q, which are mediated by IOS. The sample are taken from 154 manufacturing company financial statements during 2010 to 2012. The data were tested using path analysis. The research found that dividend and funding policy positively influence IOS. Investment opportunity (IOS positively influences the firm value. IOS was able to mediate the effect of dividends to the firm value, and also the influence of funding decisions to firm value.

  17. TTEO (Things Talk to Each Other): Programming Smart Spaces Based on IoT Systems.

    Science.gov (United States)

    Yun, Jaeseok; Ahn, Il-Yeup; Choi, Sung-Chan; Kim, Jaeho

    2016-04-01

    The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other). We present the full details on the system architecture and the software platforms for IoT servers and devices, called Mobius and &Cube, respectively, complying with the globally-applicable IoT standards, oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app. We hope that our approach will help developers and lead users for IoT devices and application services to establish an emerging IoT ecosystem, just like the ecosystem for smartphones and mobile applications.

  18. TTEO (Things Talk to Each Other: Programming Smart Spaces Based on IoT Systems

    Directory of Open Access Journals (Sweden)

    Jaeseok Yun

    2016-04-01

    Full Text Available The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other. We present the full details on the system architecture and the software platforms for IoT servers and devices, called Mobius and &Cube, respectively, complying with the globally-applicable IoT standards, oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app. We hope that our approach will help developers and lead users for IoT devices and application services to establish an emerging IoT ecosystem, just like the ecosystem for smartphones and mobile applications.

  19. IoT real time data acquisition using MQTT protocol

    Science.gov (United States)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  20. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.

    Science.gov (United States)

    Suárez-Albela, Manuel; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis

    2017-08-29

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to

  1. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

    Science.gov (United States)

    Castedo, Luis

    2017-01-01

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up

  2. Information security of Smart Factories

    Science.gov (United States)

    Iureva, R. A.; Andreev, Y. S.; Iuvshin, A. M.; Timko, A. S.

    2018-05-01

    In several years, technologies and systems based on the Internet of things (IoT) will be widely used in all smart factories. When processing a huge array of unstructured data, their filtration and adequate interpretation are a priority for enterprises. In this context, the correct representation of information in a user-friendly form acquires special importance, for which the market today presents advanced analytical platforms designed to collect, store and analyze data on technological processes and events in real time. The main idea of the paper is the statement of the information security problem in IoT and integrity of processed information.

  3. Towards A New Opportunistic IoT Network Architecture for Wildlife Monitoring System

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Meratnia, Nirvana; Havinga, Paul J.M.

    In this paper we introduce an opportunistic dual radio IoT network architecture for wildlife monitoring systems (WMS). Since data processing consumes less energy than transmitting the raw data, the proposed architecture leverages opportunistic mobile networks in a fixed LPWAN IoT network

  4. Hotspots on Io During the Ganymede 2 Encounter

    Science.gov (United States)

    1996-01-01

    The Near Infrared Mapping Spectrometer (NIMS) on the Galileo spacecraft imaged Io at high spectral resolution at a range of 439,000 km (275,000 miles) during the G2 encounter on 6 September 1996. This image shows, on the right, Io as seen by NIMS, centered on 150 W longitude. The image on the left shows the same view point from Voyager data (from the encounters in 1979 and 1980). The NIMS image can be compared to the NIMS hotspot image from the G1 orbit (June 1996) to monitor changes on Io. The most dramatic feature of the G2 image is the hotspot at Malik Patera. Preliminary analysis of the data yields a temperature of at least 1000 K (727 C) for this hotspot, an increase of more than 300 K from the G1 encounter. In the overlap area of the G1 and G2 images all the hotspots seen during the G1 encounter are also seen in the G2 image. Other hotspots were seen, including one at the Pele plume origin site. This image is at the 4 micron band to best view the Malik hotspot. Most of the other hotspots are best seen at longer wavelengths. NIMS is continuing to observe Io to monitor volcanic activity throughout the Galileo mission.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov.

  5. Synthesis, crystal structure and optical properties of two new layered cadmium iodates: Cd(IO3)X (X=Cl, OH)

    International Nuclear Information System (INIS)

    Yang, Bing-Ping; Mao, Jiang-Gao

    2014-01-01

    Systematic explorations of new compounds in the cadmium iodate system by hydrothermal reactions led to two layered iodates, namely, Cd(IO 3 )X (X=Cl, OH). Cd(IO 3 )Cl crystallizes in the orthorhombic space group Cmca (No. 64) whereas Cd(IO 3 )(OH) crystallizes in the orthorhombic space group Pnma (No. 62). Cd(IO 3 )Cl displays a unique double layered structure composed of 1 ∞ [Cd−O 3 Cl] n chains. Cadmium octahedrons form a 1D chain along the a-axis through edge sharing, and such chains are further interconnected via IO 3 groups to form a special double layer on (020) plane. Cd(IO 3 )(OH) also exhibits a layered structure that is composed of cadmium cations, IO 3 groups and hydroxyl ions. Within a layer, chains of CdO 6 edge-shared octahedra are observed along the b-axis. And these chains are connected by IO 3 groups into a layer parallel to the bc plane. Spectroscopic characterizations, elemental analysis, and thermogravimetric analysis for the reported two compounds are also presented. - Graphical abstract: Two new layered cadmium iodates Cd(IO 3 )X (X=Cl, OH) are reported. Cd(IO 3 )Cl features a unique double layered structure whereas Cd(IO 3 )(OH) displays an ordinary layered structure. - Highlights: • Two new layered cadmium iodates Cd(IO 3 )X (X=Cl, OH) are reported. • Cd(IO 3 )Cl features a unique double layered structure. • Cd(IO 3 )(OH) displays an ordinary layered structure. • The spectroscopic and thermal properties have been studied in detail

  6. BSNCare+: A Robust IoT-Oriented Healthcare System with Non-Repudiation Transactions

    Directory of Open Access Journals (Sweden)

    Kuo-Hui Yeh

    2016-12-01

    Full Text Available Recently, the rapid advancement in technologies of modern intelligent objects has led to a new network paradigm, called the Internet of Things (IoT, in which every networked and automated object has been connected in a pervasive manner. New types of IoT-based application services are thus presented. In a healthcare oriented environment, the usage of IoT has brought opportunities for assisting physicians (or nurses to provide on-demand and real-time body-care services to patients with higher accuracy and better efficiency. However, while IoT-oriented techniques deliver such advantages, they may encounter system security vulnerabilities and patient privacy threats not seen in the past. In this paper, we propose a robust IoT-based healthcare system, called BSNCare+, in which body sensor networks (BSNs are adopted as the underlying communication architecture. In the proposed healthcare system, we exploit lightweight crypto-primitives to construct a secure communication mechanism that does achieve data confidentiality and entity authentication among intelligent body sensors, the mobile gateway and the backend BSN-Care server. In addition, we evaluate the performance of the proposed healthcare system using the Raspberry PI series platform. The results show the practicability and feasibility of BSNCare+.

  7. Java I/O

    CERN Document Server

    Harold, Elliotte Rusty

    2006-01-01

    All of Java's Input/Output (I/O) facilities are based on streams, which provide simple ways to read and write data of different types. Java provides many different kinds of streams, each with its own application. The universe of streams is divided into four largecategories: input streams and output streams, for reading and writing binary data; and readers and writers, for reading and writing textual (character) data. You're almost certainly familiar with the basic kinds of streams--but did you know that there's a CipherInputStream for reading encrypted data? And a ZipOutputStream for automati

  8. Galileo observations of volcanic plumes on Io

    Science.gov (United States)

    Geissler, P.E.; McMillan, M.T.

    2008-01-01

    Io's volcanic plumes erupt in a dazzling variety of sizes, shapes, colors and opacities. In general, the plumes fall into two classes, representing distinct source gas temperatures. Most of the Galileo imaging observations were of the smaller, more numerous Prometheus-type plumes that are produced when hot flows of silicate lava impinge on volatile surface ices of SO2. Few detections were made of the giant, Pele-type plumes that vent high temperature, sulfur-rich gases from the interior of Io; this was partly because of the insensitivity of Galileo's camera to ultraviolet wavelengths. Both gas and dust spout from plumes of each class. Favorably located gas plumes were detected during eclipse, when Io was in Jupiter's shadow. Dense dust columns were imaged in daylight above several Prometheus-type eruptions, reaching heights typically less than 100 km. Comparisons between eclipse observations, sunlit images, and the record of surface changes show that these optically thick dust columns are much smaller in stature than the corresponding gas plumes but are adequate to produce the observed surface deposits. Mie scattering calculations suggest that these conspicuous dust plumes are made up of coarse grained “ash” particles with radii on the order of 100 nm, and total masses on the order of 106 kg per plume. Long exposure images of Thor in sunlight show a faint outer envelope apparently populated by particles small enough to be carried along with the gas flow, perhaps formed by condensation of sulfurous “snowflakes” as suggested by the plasma instrumentation aboard Galileo as it flew through Thor's plume [Frank, L.A., Paterson, W.R., 2002. J. Geophys. Res. (Space Phys.) 107, doi:10.1029/2002JA009240. 31-1]. If so, the total mass of these fine, nearly invisible particles may be comparable to the mass of the gas, and could account for much of Io's rapid resurfacing.

  9. Extreme Worlds of the Outer Solar System: Dynamic Processes on Uranus & Io

    Science.gov (United States)

    Kleer, Katherine Rebecca de

    A central goal of planetary science is the creation of a framework within which the properties of each solar system body can be understood as the product of initial conditions acted on by fundamental physical processes. The solar system's extreme worlds -- those objects that lie at the far ends of the spectrum in terms of planetary environment -- bring to light our misconceptions and present us with opportunities to expand and generalize this framework. Unraveling the processes at work in diverse planetary environments contextualizes our understanding of Earth, and provides a basis for interpreting specific signatures from planets beyond our own solar system. Uranus and Io, with their unusual planetary environments, present two examples of such worlds in the outer solar system. Uranus, one of the outer solar system's ice giants, produces an anomalously low heat flow and orbits the sun on its side. Its relative lack of bright storm features and its bizarre multi-decadal seasons provide insight into the relative effects of internal heat flow and time- varying solar insolation on atmospheric dynamics, while its narrow rings composed of dark, macroscopic particles encode the history of bombardment and satellite disruption within the system. Jupiter's moon Io hosts the most extreme volcanic activity anywhere in the solar system. Its tidally-powered geological activity provides a window into this satellite's interior, permitting rare and valuable investigations into the exchange of heat and materials between interiors and surfaces. In particular, Io provides a laboratory for studying the process of tidal heating, which shapes planets and satellites in our solar system and beyond. A comparison between Earth and Io contextualizes the volcanism at work on our home planet, revealing the effects of planetary size, atmospheric density, and plate tectonics on the style and mechanisms of geological activity. This dissertation investigates the processes at work on these solar

  10. Lemon : An MPI parallel I/O library for data encapsulation using LIME

    NARCIS (Netherlands)

    Deuzeman, Albert; Reker, Siebren; Urbach, Carsten

    We introduce Lemon, an MPI parallel I/O library that provides efficient parallel I/O of both binary and metadata on massively parallel architectures. Motivated by the demands of the lattice Quantum Chromodynamics community, the data is stored in the SciDAC Lattice QCD Interchange Message

  11. Pre-requisites of successful strategic electronic coordination: the moderation effect of the ownership mechanism of inter-organisational information systems

    Directory of Open Access Journals (Sweden)

    Teryokhin Sergei

    2017-12-01

    Full Text Available In this paper, we attempt to explain how the ownership mechanism of an interorganisational information system (IOS may impact strategic information exchange (electronic coordination induced by specific investments in the IOS. Recent research and practice show that heavy investments in IOSs demonstrate mixed results with respect to their impact on the electronic coordination. Consequently, the search of additional factors is needed to help and explain under what circumstances the IOS investments for strategic purposes become beneficial for the companies in a buyersupplier dyad. Transaction cost economics (TCE and the hostage model are used as a framework for the research. 198 observations of Norwegian companies in different branches of industry constitute the base of the empirical study. A buyer-supplier dyad is the unit of the analysis. A regression model of the relation between the IOS ownership mechanism and the strategic information sharing is used to test two hypotheses about the buyer-supplier collaboration via an IOS. The results demonstrate that the risk of unilateral specific investments in an IOS made by the buyer or the seller is attenuated by the ownership mechanism of the IOS. The willingness of a buyer to share their strategic information with the supplier via the IOS increases if the supplier invests in the IOS which is owned and controlled by the buyer. Conversely, the supplier becomes motivated to share certain sensitive strategic information with the buying company if the latter invests in the IOS which is owned and controlled by the supplier.

  12. Classification of Volcanic Eruptions on Io and Earth Using Low-Resolution Remote Sensing Data

    Science.gov (United States)

    Davies, A. G.; Keszthelyi, L. P.

    2005-01-01

    Two bodies in the Solar System exhibit high-temperature active volcanism: Earth and Io. While there are important differences in the eruptions on Earth and Io, in low-spatial-resolution data (corresponding to the bulk of available and foreseeable data of Io), similar styles of effusive and explosive volcanism yield similar thermal flux densities. For example, a square metre of an active pahoehoe flow on Io looks very similar to a square metre of an active pahoehoe flow on Earth. If, from observed thermal emission as a function of wavelength and change in thermal emission with time, the eruption style of an ionian volcano can be constrained, estimates of volumetric fluxes can be made and compared with terrestrial volcanoes using techniques derived for analysing terrestrial remotely-sensed data. In this way we find that ionian volcanoes fundamentally differ from their terrestrial counterparts only in areal extent, with Io volcanoes covering larger areas, with higher volumetric flux. Io outbursts eruptions have enormous implied volumetric fluxes, and may scale with terrestrial flood basalt eruptions. Even with the low-spatial resolution data available it is possible to sometimes constrain and classify eruption style both on Io and Earth from the integrated thermal emission spectrum. Plotting 2 and 5 m fluxes reveals the evolution of individual eruptions of different styles, as well as the relative intensity of eruptions, allowing comparison to be made from individual eruptions on both planets. Analyses like this can be used for interpretation of low-resolution data until the next mission to the jovian system. For a number of Io volcanoes (including Pele, Prometheus, Amirani, Zamama, Culann, Tohil and Tvashtar) we do have high/moderate resolution imagery to aid determination of eruption mode from analyses based only on low spatial-resolution data.

  13. Give me a hint: An ID-free small data transmission protocol for dense IoT devices

    OpenAIRE

    Ren, Yi; Wu, Ren-Jie; Huang, Teng-Wei; Tseng, Yu-Chee

    2017-01-01

    IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication networks, when applied to IoT scenarios, however, do not fit well to these requirements....

  14. The final Galileo SSI observations of Io: Orbits G28-I33

    Science.gov (United States)

    Turtle, E.P.; Keszthelyi, L.P.; McEwen, A.S.; Radebaugh, J.; Milazzo, M.; Simonelli, D.P.; Geissler, P.; Williams, D.A.; Perry, J.; Jaeger, W.L.; Klaasen, K.P.; Breneman, H.H.; Denk, T.; Phillips, C.B.

    2004-01-01

    We present the observations of Io acquired by the Solid State Imaging (SSI) experiment during the Galileo Millennium Mission (GMM) and the strategy we used to plan the exploration of Io. Despite Galileo's tight restrictions on data volume and downlink capability and several spacecraft and camera anomalies due to the intense radiation close to Jupiter, there were many successful SSI observations during GMM. Four giant, high-latitude plumes, including the largest plume ever observed on Io, were documented over a period of eight months; only faint evidence of such plumes had been seen since the Voyager 2 encounter, despite monitoring by Galileo during the previous five years. Moreover, the source of one of the plumes was Tvashtar Catena, demonstrating that a single site can exhibit remarkably diverse eruption styles - from a curtain of lava fountains, to extensive surface flows, and finally a ??? 400 km high plume - over a relatively short period of time (??? 13 months between orbits 125 and G29). Despite this substantial activity, no evidence of any truly new volcanic center was seen during the six years of Galileo observations. The recent observations also revealed details of mass wasting processes acting on Io. Slumping and landsliding dominate and occur in close proximity to each other, demonstrating spatial variation in material properties over distances of several kilometers. However, despite the ubiquitous evidence for mass wasting, the rate of volcanic resurfacing seems to dominate; the floors of paterae in proximity to mountains are generally free of debris. Finally, the highest resolution observations obtained during Galileo's final encounters with Io provided further evidence for a wide diversity of surface processes at work on Io. ?? 2003 Elsevier Inc. All rights reserved.

  15. Energy-Aware Computation Offloading of IoT Sensors in Cloudlet-Based Mobile Edge Computing.

    Science.gov (United States)

    Ma, Xiao; Lin, Chuang; Zhang, Han; Liu, Jianwei

    2018-06-15

    Mobile edge computing is proposed as a promising computing paradigm to relieve the excessive burden of data centers and mobile networks, which is induced by the rapid growth of Internet of Things (IoT). This work introduces the cloud-assisted multi-cloudlet framework to provision scalable services in cloudlet-based mobile edge computing. Due to the constrained computation resources of cloudlets and limited communication resources of wireless access points (APs), IoT sensors with identical computation offloading decisions interact with each other. To optimize the processing delay and energy consumption of computation tasks, theoretic analysis of the computation offloading decision problem of IoT sensors is presented in this paper. In more detail, the computation offloading decision problem of IoT sensors is formulated as a computation offloading game and the condition of Nash equilibrium is derived by introducing the tool of a potential game. By exploiting the finite improvement property of the game, the Computation Offloading Decision (COD) algorithm is designed to provide decentralized computation offloading strategies for IoT sensors. Simulation results demonstrate that the COD algorithm can significantly reduce the system cost compared with the random-selection algorithm and the cloud-first algorithm. Furthermore, the COD algorithm can scale well with increasing IoT sensors.

  16. Remote Monitoring of Soil Water Content, Temperature, and Heat Flow Using Low-Cost Cellular (3G) IoT Technology

    Science.gov (United States)

    Ham, J. M.

    2016-12-01

    New microprocessor boards, open-source sensors, and cloud infrastructure developed for the Internet of Things (IoT) can be used to create low-cost monitoring systems for environmental research. This project describes two applications in soil science and hydrology: 1) remote monitoring of the soil temperature regime near oil and gas operations to detect the thermal signature associated with the natural source zone degradation of hydrocarbon contaminants in the vadose zone, and 2) remote monitoring of soil water content near the surface as part of a global citizen science network. In both cases, prototype data collection systems were built around the cellular (2G/3G) "Electron" microcontroller (www.particle.io). This device allows connectivity to the cloud using a low-cost global SIM and data plan. The systems have cellular connectivity in over 100 countries and data can be logged to the cloud for storage. Users can view data real time over any internet connection or via their smart phone. For both projects, data logging, storage, and visualization was done using IoT services like Thingspeak (thingspeak.com). The soil thermal monitoring system was tested on experimental plots in Colorado USA to evaluate the accuracy and reliability of different temperature sensors and 3D printed housings. The soil water experiment included comparison opens-source capacitance-based sensors to commercial versions. Results demonstrate the power of leveraging IoT technology for field research.

  17. SSTL I/O Standard Based Arithmetic Circuits Design on FPGA

    DEFF Research Database (Denmark)

    Goswami, Kavita; Pandey, Bishwajeet; Hussain, Dil muhammed Akbar

    2016-01-01

    -Tiryagbhyam”. SSTL135_R is minimum I/O power consumer. SSTL135_DCI is maximum power consumer. When we use SSTL135_R in place of SSTL12, SSTL12_DCI, SSTL15, and SSTL135_DCI, there is 42.5%, 82.7%, 28.12%, and 72.9% reduction in I/O power at 21oC, 40oC, 53.5oC and 56.7oC. This design is implemented on Artix-7 FPGA...

  18. Case Study: IoT Data Integration for Higher Education Institution

    Directory of Open Access Journals (Sweden)

    Pinka Krišjānis

    2016-12-01

    Full Text Available Nowadays the Internet of Things (IoT is one of the most trending technologies. It is expected that by year 2020 there will be 50 billion of Internet-connected devices. Fields like smart cities and smart homes largely rely on IoT phenomena by using a wide variety of sensors for data collection, analysis and corresponding actions. The paper describes how this trending and relatively new technology is applied at Riga Technical University for educational purposes.

  19. Operating Systems for Low-End Devices in the Internet of Things: a Survey

    OpenAIRE

    Hahm , Oliver; Baccelli , Emmanuel; Petersen , Hauke; Tsiftes , Nicolas

    2016-01-01

    International audience; The Internet of Things (IoT) is projected to soon interconnect tens of billions of new devices, in large part also connected to the Internet. IoT devices include both high-end devices which can use traditional go-to operating systems (OS) such as Linux, and low-end devices which cannot, due to stringent resource constraints, e.g. very limited memory, computational power, and power supply. However, large-scale IoT software development, deployment, and maintenance requir...

  20. mIoT Slice for 5G Systems: Design and Performance Evaluation.

    Science.gov (United States)

    Trivisonno, Riccardo; Condoluci, Massimo; An, Xueli; Mahmoodi, Toktam

    2018-02-21

    Network slicing is a key feature of the upcoming 5G networks allowing the design and deployment of customized communication systems to integrate services provided by vertical industries. In this context, massive Internet of Things (mIoT) is regarded as a compelling use case, both for its relevance from business perspective, and for the technical challenges it poses to network design. With their envisaged massive deployment of devices requiring sporadic connectivity and small data transmission, yet Quality of Service (QoS) constrained, mIoT services will need an ad-hoc end-to-end (E2E) slice, i.e., both access and core network with enhanced Control and User planes (CP/UP). After revising the key requirements of mIoT and identifying major shortcomings of previous generation networks, this paper presents and evaluates an E2E mIoT network slicing solution, featuring a new connectivity model overcoming the load limitations of legacy systems. Unique in its kind, this paper addresses mIoT requirements from an end-to-end perspective highlighting and solving, unlike most prior related work, the connectivity challenges posed to the core network. Results demonstrate that the proposed solution, reducing CP signaling and optimizing UP resource utilization, is a suitable candidate for next generation network standards to efficiently handle massive device deployment.